May 13 06:53:06.863508 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon May 12 23:08:12 -00 2025 May 13 06:53:06.863529 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 06:53:06.863539 kernel: BIOS-provided physical RAM map: May 13 06:53:06.863549 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 13 06:53:06.863556 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 13 06:53:06.863564 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 13 06:53:06.863572 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdcfff] usable May 13 06:53:06.863579 kernel: BIOS-e820: [mem 0x00000000bffdd000-0x00000000bfffffff] reserved May 13 06:53:06.863586 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 13 06:53:06.863593 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 13 06:53:06.863600 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable May 13 06:53:06.863607 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved May 13 06:53:06.863616 kernel: NX (Execute Disable) protection: active May 13 06:53:06.863623 kernel: SMBIOS 3.0.0 present. May 13 06:53:06.863632 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.16.3-debian-1.16.3-2 04/01/2014 May 13 06:53:06.863639 kernel: Hypervisor detected: KVM May 13 06:53:06.863647 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 13 06:53:06.863654 kernel: kvm-clock: cpu 0, msr 13f196001, primary cpu clock May 13 06:53:06.863664 kernel: kvm-clock: using sched offset of 3943012316 cycles May 13 06:53:06.863672 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 13 06:53:06.863680 kernel: tsc: Detected 1996.249 MHz processor May 13 06:53:06.863688 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 13 06:53:06.863696 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 13 06:53:06.863704 kernel: last_pfn = 0x140000 max_arch_pfn = 0x400000000 May 13 06:53:06.863712 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 13 06:53:06.863719 kernel: last_pfn = 0xbffdd max_arch_pfn = 0x400000000 May 13 06:53:06.863727 kernel: ACPI: Early table checksum verification disabled May 13 06:53:06.863736 kernel: ACPI: RSDP 0x00000000000F51E0 000014 (v00 BOCHS ) May 13 06:53:06.863744 kernel: ACPI: RSDT 0x00000000BFFE1B65 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 06:53:06.863752 kernel: ACPI: FACP 0x00000000BFFE1A49 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 06:53:06.863760 kernel: ACPI: DSDT 0x00000000BFFE0040 001A09 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 06:53:06.863768 kernel: ACPI: FACS 0x00000000BFFE0000 000040 May 13 06:53:06.863775 kernel: ACPI: APIC 0x00000000BFFE1ABD 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 13 06:53:06.863783 kernel: ACPI: WAET 0x00000000BFFE1B3D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 06:53:06.863791 kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1a49-0xbffe1abc] May 13 06:53:06.863800 kernel: ACPI: Reserving DSDT table memory at [mem 0xbffe0040-0xbffe1a48] May 13 06:53:06.863808 kernel: ACPI: Reserving FACS table memory at [mem 0xbffe0000-0xbffe003f] May 13 06:53:06.863816 kernel: ACPI: Reserving APIC table memory at [mem 0xbffe1abd-0xbffe1b3c] May 13 06:53:06.863824 kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1b3d-0xbffe1b64] May 13 06:53:06.863831 kernel: No NUMA configuration found May 13 06:53:06.863842 kernel: Faking a node at [mem 0x0000000000000000-0x000000013fffffff] May 13 06:53:06.863850 kernel: NODE_DATA(0) allocated [mem 0x13fffa000-0x13fffffff] May 13 06:53:06.863860 kernel: Zone ranges: May 13 06:53:06.863868 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 13 06:53:06.863876 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 13 06:53:06.863884 kernel: Normal [mem 0x0000000100000000-0x000000013fffffff] May 13 06:53:06.863892 kernel: Movable zone start for each node May 13 06:53:06.863900 kernel: Early memory node ranges May 13 06:53:06.863908 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 13 06:53:06.863930 kernel: node 0: [mem 0x0000000000100000-0x00000000bffdcfff] May 13 06:53:06.863941 kernel: node 0: [mem 0x0000000100000000-0x000000013fffffff] May 13 06:53:06.863949 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000013fffffff] May 13 06:53:06.863957 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 13 06:53:06.863965 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 13 06:53:06.863973 kernel: On node 0, zone Normal: 35 pages in unavailable ranges May 13 06:53:06.863981 kernel: ACPI: PM-Timer IO Port: 0x608 May 13 06:53:06.863989 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 13 06:53:06.863997 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 13 06:53:06.864005 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 13 06:53:06.864015 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 13 06:53:06.864024 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 13 06:53:06.864032 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 13 06:53:06.864040 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 13 06:53:06.864048 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 13 06:53:06.864056 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 13 06:53:06.864064 kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices May 13 06:53:06.864072 kernel: Booting paravirtualized kernel on KVM May 13 06:53:06.864080 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 13 06:53:06.864091 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 13 06:53:06.864099 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 13 06:53:06.864107 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 13 06:53:06.864115 kernel: pcpu-alloc: [0] 0 1 May 13 06:53:06.864123 kernel: kvm-guest: stealtime: cpu 0, msr 13fc1c0c0 May 13 06:53:06.864131 kernel: kvm-guest: PV spinlocks disabled, no host support May 13 06:53:06.864139 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1031901 May 13 06:53:06.864147 kernel: Policy zone: Normal May 13 06:53:06.864156 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 06:53:06.864167 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 13 06:53:06.864175 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 13 06:53:06.864183 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 13 06:53:06.864191 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 13 06:53:06.864200 kernel: Memory: 3968288K/4193772K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 225224K reserved, 0K cma-reserved) May 13 06:53:06.864208 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 13 06:53:06.864216 kernel: ftrace: allocating 34584 entries in 136 pages May 13 06:53:06.864224 kernel: ftrace: allocated 136 pages with 2 groups May 13 06:53:06.864234 kernel: rcu: Hierarchical RCU implementation. May 13 06:53:06.864243 kernel: rcu: RCU event tracing is enabled. May 13 06:53:06.864251 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 13 06:53:06.864260 kernel: Rude variant of Tasks RCU enabled. May 13 06:53:06.864268 kernel: Tracing variant of Tasks RCU enabled. May 13 06:53:06.864276 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 13 06:53:06.864284 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 13 06:53:06.864292 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 13 06:53:06.864300 kernel: Console: colour VGA+ 80x25 May 13 06:53:06.864310 kernel: printk: console [tty0] enabled May 13 06:53:06.864318 kernel: printk: console [ttyS0] enabled May 13 06:53:06.864326 kernel: ACPI: Core revision 20210730 May 13 06:53:06.864334 kernel: APIC: Switch to symmetric I/O mode setup May 13 06:53:06.864342 kernel: x2apic enabled May 13 06:53:06.864350 kernel: Switched APIC routing to physical x2apic. May 13 06:53:06.864358 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 13 06:53:06.864366 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 13 06:53:06.864375 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) May 13 06:53:06.864385 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 May 13 06:53:06.864393 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 May 13 06:53:06.864401 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 13 06:53:06.864409 kernel: Spectre V2 : Mitigation: Retpolines May 13 06:53:06.864417 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 13 06:53:06.864425 kernel: Speculative Store Bypass: Vulnerable May 13 06:53:06.864433 kernel: x86/fpu: x87 FPU will use FXSAVE May 13 06:53:06.864441 kernel: Freeing SMP alternatives memory: 32K May 13 06:53:06.864449 kernel: pid_max: default: 32768 minimum: 301 May 13 06:53:06.864459 kernel: LSM: Security Framework initializing May 13 06:53:06.864467 kernel: SELinux: Initializing. May 13 06:53:06.864475 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 06:53:06.864483 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 06:53:06.864492 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) May 13 06:53:06.864500 kernel: Performance Events: AMD PMU driver. May 13 06:53:06.864514 kernel: ... version: 0 May 13 06:53:06.864524 kernel: ... bit width: 48 May 13 06:53:06.864532 kernel: ... generic registers: 4 May 13 06:53:06.864541 kernel: ... value mask: 0000ffffffffffff May 13 06:53:06.864549 kernel: ... max period: 00007fffffffffff May 13 06:53:06.864558 kernel: ... fixed-purpose events: 0 May 13 06:53:06.864568 kernel: ... event mask: 000000000000000f May 13 06:53:06.864576 kernel: signal: max sigframe size: 1440 May 13 06:53:06.864585 kernel: rcu: Hierarchical SRCU implementation. May 13 06:53:06.864593 kernel: smp: Bringing up secondary CPUs ... May 13 06:53:06.864602 kernel: x86: Booting SMP configuration: May 13 06:53:06.864612 kernel: .... node #0, CPUs: #1 May 13 06:53:06.864620 kernel: kvm-clock: cpu 1, msr 13f196041, secondary cpu clock May 13 06:53:06.864629 kernel: kvm-guest: stealtime: cpu 1, msr 13fd1c0c0 May 13 06:53:06.864638 kernel: smp: Brought up 1 node, 2 CPUs May 13 06:53:06.864647 kernel: smpboot: Max logical packages: 2 May 13 06:53:06.864655 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) May 13 06:53:06.864664 kernel: devtmpfs: initialized May 13 06:53:06.864672 kernel: x86/mm: Memory block size: 128MB May 13 06:53:06.864681 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 13 06:53:06.864691 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 13 06:53:06.864700 kernel: pinctrl core: initialized pinctrl subsystem May 13 06:53:06.864708 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 13 06:53:06.864717 kernel: audit: initializing netlink subsys (disabled) May 13 06:53:06.864725 kernel: audit: type=2000 audit(1747119185.806:1): state=initialized audit_enabled=0 res=1 May 13 06:53:06.864734 kernel: thermal_sys: Registered thermal governor 'step_wise' May 13 06:53:06.864742 kernel: thermal_sys: Registered thermal governor 'user_space' May 13 06:53:06.864751 kernel: cpuidle: using governor menu May 13 06:53:06.864759 kernel: ACPI: bus type PCI registered May 13 06:53:06.864770 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 13 06:53:06.864778 kernel: dca service started, version 1.12.1 May 13 06:53:06.864787 kernel: PCI: Using configuration type 1 for base access May 13 06:53:06.864795 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 13 06:53:06.864804 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 13 06:53:06.864812 kernel: ACPI: Added _OSI(Module Device) May 13 06:53:06.864821 kernel: ACPI: Added _OSI(Processor Device) May 13 06:53:06.864829 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 13 06:53:06.864837 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 13 06:53:06.864847 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 13 06:53:06.864856 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 13 06:53:06.864864 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 13 06:53:06.864873 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 13 06:53:06.864881 kernel: ACPI: Interpreter enabled May 13 06:53:06.864890 kernel: ACPI: PM: (supports S0 S3 S5) May 13 06:53:06.864898 kernel: ACPI: Using IOAPIC for interrupt routing May 13 06:53:06.864907 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 13 06:53:06.864926 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 13 06:53:06.866993 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 13 06:53:06.867137 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 13 06:53:06.867226 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 13 06:53:06.867240 kernel: acpiphp: Slot [3] registered May 13 06:53:06.867263 kernel: acpiphp: Slot [4] registered May 13 06:53:06.867271 kernel: acpiphp: Slot [5] registered May 13 06:53:06.867279 kernel: acpiphp: Slot [6] registered May 13 06:53:06.867287 kernel: acpiphp: Slot [7] registered May 13 06:53:06.867298 kernel: acpiphp: Slot [8] registered May 13 06:53:06.867306 kernel: acpiphp: Slot [9] registered May 13 06:53:06.867324 kernel: acpiphp: Slot [10] registered May 13 06:53:06.867333 kernel: acpiphp: Slot [11] registered May 13 06:53:06.867341 kernel: acpiphp: Slot [12] registered May 13 06:53:06.867349 kernel: acpiphp: Slot [13] registered May 13 06:53:06.867357 kernel: acpiphp: Slot [14] registered May 13 06:53:06.867366 kernel: acpiphp: Slot [15] registered May 13 06:53:06.867374 kernel: acpiphp: Slot [16] registered May 13 06:53:06.867384 kernel: acpiphp: Slot [17] registered May 13 06:53:06.867392 kernel: acpiphp: Slot [18] registered May 13 06:53:06.867401 kernel: acpiphp: Slot [19] registered May 13 06:53:06.867409 kernel: acpiphp: Slot [20] registered May 13 06:53:06.867417 kernel: acpiphp: Slot [21] registered May 13 06:53:06.867426 kernel: acpiphp: Slot [22] registered May 13 06:53:06.867434 kernel: acpiphp: Slot [23] registered May 13 06:53:06.867442 kernel: acpiphp: Slot [24] registered May 13 06:53:06.867451 kernel: acpiphp: Slot [25] registered May 13 06:53:06.867459 kernel: acpiphp: Slot [26] registered May 13 06:53:06.867469 kernel: acpiphp: Slot [27] registered May 13 06:53:06.867477 kernel: acpiphp: Slot [28] registered May 13 06:53:06.867485 kernel: acpiphp: Slot [29] registered May 13 06:53:06.867494 kernel: acpiphp: Slot [30] registered May 13 06:53:06.867502 kernel: acpiphp: Slot [31] registered May 13 06:53:06.867510 kernel: PCI host bridge to bus 0000:00 May 13 06:53:06.867618 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 13 06:53:06.867701 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 13 06:53:06.867786 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 13 06:53:06.867866 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 13 06:53:06.868940 kernel: pci_bus 0000:00: root bus resource [mem 0xc000000000-0xc07fffffff window] May 13 06:53:06.869027 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 13 06:53:06.869133 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 13 06:53:06.869231 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 13 06:53:06.869327 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 May 13 06:53:06.869409 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] May 13 06:53:06.869493 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 13 06:53:06.869575 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 13 06:53:06.869657 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 13 06:53:06.869739 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 13 06:53:06.869832 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 May 13 06:53:06.871971 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI May 13 06:53:06.872080 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB May 13 06:53:06.872182 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 May 13 06:53:06.872268 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] May 13 06:53:06.872359 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xc000000000-0xc000003fff 64bit pref] May 13 06:53:06.872450 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] May 13 06:53:06.872540 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] May 13 06:53:06.872634 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 13 06:53:06.872736 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 May 13 06:53:06.872827 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] May 13 06:53:06.872972 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] May 13 06:53:06.873072 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xc000004000-0xc000007fff 64bit pref] May 13 06:53:06.873162 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] May 13 06:53:06.873253 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 May 13 06:53:06.873340 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] May 13 06:53:06.873422 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] May 13 06:53:06.873503 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xc000008000-0xc00000bfff 64bit pref] May 13 06:53:06.873594 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 May 13 06:53:06.873677 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] May 13 06:53:06.873759 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xc00000c000-0xc00000ffff 64bit pref] May 13 06:53:06.873852 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 May 13 06:53:06.873953 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] May 13 06:53:06.874036 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfeb93000-0xfeb93fff] May 13 06:53:06.874118 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xc000010000-0xc000013fff 64bit pref] May 13 06:53:06.874131 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 13 06:53:06.874139 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 13 06:53:06.874148 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 13 06:53:06.874156 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 13 06:53:06.874167 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 13 06:53:06.874175 kernel: iommu: Default domain type: Translated May 13 06:53:06.874183 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 13 06:53:06.874264 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device May 13 06:53:06.874347 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 13 06:53:06.874429 kernel: pci 0000:00:02.0: vgaarb: bridge control possible May 13 06:53:06.874442 kernel: vgaarb: loaded May 13 06:53:06.874450 kernel: pps_core: LinuxPPS API ver. 1 registered May 13 06:53:06.874459 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 13 06:53:06.874469 kernel: PTP clock support registered May 13 06:53:06.874477 kernel: PCI: Using ACPI for IRQ routing May 13 06:53:06.874485 kernel: PCI: pci_cache_line_size set to 64 bytes May 13 06:53:06.874494 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 13 06:53:06.874501 kernel: e820: reserve RAM buffer [mem 0xbffdd000-0xbfffffff] May 13 06:53:06.874509 kernel: clocksource: Switched to clocksource kvm-clock May 13 06:53:06.874517 kernel: VFS: Disk quotas dquot_6.6.0 May 13 06:53:06.874525 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 13 06:53:06.874534 kernel: pnp: PnP ACPI init May 13 06:53:06.874620 kernel: pnp 00:03: [dma 2] May 13 06:53:06.874632 kernel: pnp: PnP ACPI: found 5 devices May 13 06:53:06.874641 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 13 06:53:06.874649 kernel: NET: Registered PF_INET protocol family May 13 06:53:06.874657 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 13 06:53:06.874666 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 13 06:53:06.874674 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 13 06:53:06.874682 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 13 06:53:06.874692 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 13 06:53:06.874701 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 13 06:53:06.874709 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 06:53:06.874717 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 06:53:06.874725 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 13 06:53:06.874733 kernel: NET: Registered PF_XDP protocol family May 13 06:53:06.874806 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 13 06:53:06.874878 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 13 06:53:06.874966 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 13 06:53:06.875044 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] May 13 06:53:06.875121 kernel: pci_bus 0000:00: resource 8 [mem 0xc000000000-0xc07fffffff window] May 13 06:53:06.875204 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release May 13 06:53:06.875302 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 13 06:53:06.875385 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 13 06:53:06.875397 kernel: PCI: CLS 0 bytes, default 64 May 13 06:53:06.875405 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 13 06:53:06.875413 kernel: software IO TLB: mapped [mem 0x00000000bbfdd000-0x00000000bffdd000] (64MB) May 13 06:53:06.875424 kernel: Initialise system trusted keyrings May 13 06:53:06.875432 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 13 06:53:06.875440 kernel: Key type asymmetric registered May 13 06:53:06.875448 kernel: Asymmetric key parser 'x509' registered May 13 06:53:06.875456 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 13 06:53:06.875464 kernel: io scheduler mq-deadline registered May 13 06:53:06.875472 kernel: io scheduler kyber registered May 13 06:53:06.875480 kernel: io scheduler bfq registered May 13 06:53:06.875487 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 13 06:53:06.875497 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 May 13 06:53:06.875505 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 May 13 06:53:06.875514 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 13 06:53:06.875522 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 May 13 06:53:06.875529 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 13 06:53:06.875537 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 13 06:53:06.875545 kernel: random: crng init done May 13 06:53:06.875553 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 13 06:53:06.875561 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 13 06:53:06.875571 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 13 06:53:06.875579 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 13 06:53:06.875661 kernel: rtc_cmos 00:04: RTC can wake from S4 May 13 06:53:06.875737 kernel: rtc_cmos 00:04: registered as rtc0 May 13 06:53:06.875812 kernel: rtc_cmos 00:04: setting system clock to 2025-05-13T06:53:06 UTC (1747119186) May 13 06:53:06.875886 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram May 13 06:53:06.875898 kernel: NET: Registered PF_INET6 protocol family May 13 06:53:06.875906 kernel: Segment Routing with IPv6 May 13 06:53:06.878951 kernel: In-situ OAM (IOAM) with IPv6 May 13 06:53:06.878963 kernel: NET: Registered PF_PACKET protocol family May 13 06:53:06.878972 kernel: Key type dns_resolver registered May 13 06:53:06.878980 kernel: IPI shorthand broadcast: enabled May 13 06:53:06.878988 kernel: sched_clock: Marking stable (834840897, 185766903)->(1103429081, -82821281) May 13 06:53:06.878997 kernel: registered taskstats version 1 May 13 06:53:06.879005 kernel: Loading compiled-in X.509 certificates May 13 06:53:06.879013 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 52373c12592f53b0567bb941a0a0fec888191095' May 13 06:53:06.879021 kernel: Key type .fscrypt registered May 13 06:53:06.879031 kernel: Key type fscrypt-provisioning registered May 13 06:53:06.879039 kernel: ima: No TPM chip found, activating TPM-bypass! May 13 06:53:06.879048 kernel: ima: Allocated hash algorithm: sha1 May 13 06:53:06.879055 kernel: ima: No architecture policies found May 13 06:53:06.879063 kernel: clk: Disabling unused clocks May 13 06:53:06.879071 kernel: Freeing unused kernel image (initmem) memory: 47456K May 13 06:53:06.879079 kernel: Write protecting the kernel read-only data: 28672k May 13 06:53:06.879087 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 13 06:53:06.879097 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 13 06:53:06.879105 kernel: Run /init as init process May 13 06:53:06.879113 kernel: with arguments: May 13 06:53:06.879120 kernel: /init May 13 06:53:06.879128 kernel: with environment: May 13 06:53:06.879136 kernel: HOME=/ May 13 06:53:06.879143 kernel: TERM=linux May 13 06:53:06.879151 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 13 06:53:06.879162 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 06:53:06.879174 systemd[1]: Detected virtualization kvm. May 13 06:53:06.879183 systemd[1]: Detected architecture x86-64. May 13 06:53:06.879192 systemd[1]: Running in initrd. May 13 06:53:06.879201 systemd[1]: No hostname configured, using default hostname. May 13 06:53:06.879209 systemd[1]: Hostname set to . May 13 06:53:06.879218 systemd[1]: Initializing machine ID from VM UUID. May 13 06:53:06.879227 systemd[1]: Queued start job for default target initrd.target. May 13 06:53:06.879237 systemd[1]: Started systemd-ask-password-console.path. May 13 06:53:06.879286 systemd[1]: Reached target cryptsetup.target. May 13 06:53:06.879295 systemd[1]: Reached target paths.target. May 13 06:53:06.879303 systemd[1]: Reached target slices.target. May 13 06:53:06.879312 systemd[1]: Reached target swap.target. May 13 06:53:06.879320 systemd[1]: Reached target timers.target. May 13 06:53:06.879331 systemd[1]: Listening on iscsid.socket. May 13 06:53:06.879341 systemd[1]: Listening on iscsiuio.socket. May 13 06:53:06.879352 systemd[1]: Listening on systemd-journald-audit.socket. May 13 06:53:06.879369 systemd[1]: Listening on systemd-journald-dev-log.socket. May 13 06:53:06.879380 systemd[1]: Listening on systemd-journald.socket. May 13 06:53:06.879389 systemd[1]: Listening on systemd-networkd.socket. May 13 06:53:06.879398 systemd[1]: Listening on systemd-udevd-control.socket. May 13 06:53:06.879408 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 06:53:06.879419 systemd[1]: Reached target sockets.target. May 13 06:53:06.879428 systemd[1]: Starting kmod-static-nodes.service... May 13 06:53:06.879438 systemd[1]: Finished network-cleanup.service. May 13 06:53:06.879447 systemd[1]: Starting systemd-fsck-usr.service... May 13 06:53:06.879456 systemd[1]: Starting systemd-journald.service... May 13 06:53:06.879466 systemd[1]: Starting systemd-modules-load.service... May 13 06:53:06.879475 systemd[1]: Starting systemd-resolved.service... May 13 06:53:06.879484 systemd[1]: Starting systemd-vconsole-setup.service... May 13 06:53:06.879494 systemd[1]: Finished kmod-static-nodes.service. May 13 06:53:06.879505 kernel: audit: type=1130 audit(1747119186.863:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:06.879514 systemd[1]: Finished systemd-fsck-usr.service. May 13 06:53:06.879526 systemd-journald[186]: Journal started May 13 06:53:06.879574 systemd-journald[186]: Runtime Journal (/run/log/journal/c8b3f81f7a444c51adffac6799972907) is 8.0M, max 78.4M, 70.4M free. May 13 06:53:06.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:06.864963 systemd-modules-load[187]: Inserted module 'overlay' May 13 06:53:06.946770 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 13 06:53:06.946795 kernel: Bridge firewalling registered May 13 06:53:06.946808 systemd[1]: Started systemd-journald.service. May 13 06:53:06.946823 kernel: audit: type=1130 audit(1747119186.932:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:06.946835 kernel: SCSI subsystem initialized May 13 06:53:06.946846 kernel: audit: type=1130 audit(1747119186.941:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:06.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:06.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:06.898437 systemd-resolved[188]: Positive Trust Anchors: May 13 06:53:06.954276 kernel: audit: type=1130 audit(1747119186.946:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:06.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:06.898447 systemd-resolved[188]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 06:53:06.898483 systemd-resolved[188]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 06:53:06.908128 systemd-resolved[188]: Defaulting to hostname 'linux'. May 13 06:53:06.911086 systemd-modules-load[187]: Inserted module 'br_netfilter' May 13 06:53:06.972786 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 13 06:53:06.972806 kernel: device-mapper: uevent: version 1.0.3 May 13 06:53:06.972818 kernel: audit: type=1130 audit(1747119186.957:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:06.972831 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 13 06:53:06.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:06.942384 systemd[1]: Started systemd-resolved.service. May 13 06:53:06.947402 systemd[1]: Finished systemd-vconsole-setup.service. May 13 06:53:06.958728 systemd[1]: Reached target nss-lookup.target. May 13 06:53:06.959999 systemd[1]: Starting dracut-cmdline-ask.service... May 13 06:53:06.974046 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 13 06:53:06.975338 systemd-modules-load[187]: Inserted module 'dm_multipath' May 13 06:53:06.979835 systemd[1]: Finished systemd-modules-load.service. May 13 06:53:06.987256 kernel: audit: type=1130 audit(1747119186.980:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:06.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:06.987457 systemd[1]: Starting systemd-sysctl.service... May 13 06:53:06.990389 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 13 06:53:06.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:06.998412 systemd[1]: Finished dracut-cmdline-ask.service. May 13 06:53:07.004072 kernel: audit: type=1130 audit(1747119186.989:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:07.004098 kernel: audit: type=1130 audit(1747119186.997:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:06.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:06.999083 systemd[1]: Finished systemd-sysctl.service. May 13 06:53:07.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:07.010321 systemd[1]: Starting dracut-cmdline.service... May 13 06:53:07.011336 kernel: audit: type=1130 audit(1747119187.004:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:07.020287 dracut-cmdline[208]: dracut-dracut-053 May 13 06:53:07.022360 dracut-cmdline[208]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 06:53:07.088946 kernel: Loading iSCSI transport class v2.0-870. May 13 06:53:07.108938 kernel: iscsi: registered transport (tcp) May 13 06:53:07.134953 kernel: iscsi: registered transport (qla4xxx) May 13 06:53:07.135008 kernel: QLogic iSCSI HBA Driver May 13 06:53:07.187078 systemd[1]: Finished dracut-cmdline.service. May 13 06:53:07.188527 systemd[1]: Starting dracut-pre-udev.service... May 13 06:53:07.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:07.271985 kernel: raid6: sse2x4 gen() 8437 MB/s May 13 06:53:07.290017 kernel: raid6: sse2x4 xor() 6536 MB/s May 13 06:53:07.307996 kernel: raid6: sse2x2 gen() 13955 MB/s May 13 06:53:07.326016 kernel: raid6: sse2x2 xor() 8732 MB/s May 13 06:53:07.343994 kernel: raid6: sse2x1 gen() 11397 MB/s May 13 06:53:07.362481 kernel: raid6: sse2x1 xor() 6979 MB/s May 13 06:53:07.362539 kernel: raid6: using algorithm sse2x2 gen() 13955 MB/s May 13 06:53:07.362567 kernel: raid6: .... xor() 8732 MB/s, rmw enabled May 13 06:53:07.367532 kernel: raid6: using ssse3x2 recovery algorithm May 13 06:53:07.383858 kernel: xor: measuring software checksum speed May 13 06:53:07.383943 kernel: prefetch64-sse : 18359 MB/sec May 13 06:53:07.386802 kernel: generic_sse : 14406 MB/sec May 13 06:53:07.386861 kernel: xor: using function: prefetch64-sse (18359 MB/sec) May 13 06:53:07.500064 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 13 06:53:07.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:07.517100 systemd[1]: Finished dracut-pre-udev.service. May 13 06:53:07.518000 audit: BPF prog-id=7 op=LOAD May 13 06:53:07.518000 audit: BPF prog-id=8 op=LOAD May 13 06:53:07.520378 systemd[1]: Starting systemd-udevd.service... May 13 06:53:07.533658 systemd-udevd[385]: Using default interface naming scheme 'v252'. May 13 06:53:07.538251 systemd[1]: Started systemd-udevd.service. May 13 06:53:07.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:07.546705 systemd[1]: Starting dracut-pre-trigger.service... May 13 06:53:07.571718 dracut-pre-trigger[406]: rd.md=0: removing MD RAID activation May 13 06:53:07.620262 systemd[1]: Finished dracut-pre-trigger.service. May 13 06:53:07.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:07.621674 systemd[1]: Starting systemd-udev-trigger.service... May 13 06:53:07.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:07.686066 systemd[1]: Finished systemd-udev-trigger.service. May 13 06:53:07.735261 kernel: virtio_blk virtio2: [vda] 20971520 512-byte logical blocks (10.7 GB/10.0 GiB) May 13 06:53:07.761787 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 13 06:53:07.761814 kernel: GPT:17805311 != 20971519 May 13 06:53:07.761832 kernel: GPT:Alternate GPT header not at the end of the disk. May 13 06:53:07.761849 kernel: GPT:17805311 != 20971519 May 13 06:53:07.761866 kernel: GPT: Use GNU Parted to correct GPT errors. May 13 06:53:07.761883 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 06:53:07.791951 kernel: libata version 3.00 loaded. May 13 06:53:07.795121 kernel: ata_piix 0000:00:01.1: version 2.13 May 13 06:53:07.809109 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (441) May 13 06:53:07.809136 kernel: scsi host0: ata_piix May 13 06:53:07.809292 kernel: scsi host1: ata_piix May 13 06:53:07.809442 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 May 13 06:53:07.809463 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 May 13 06:53:07.797586 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 13 06:53:07.842136 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 13 06:53:07.846157 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 13 06:53:07.850273 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 13 06:53:07.855951 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 06:53:07.857576 systemd[1]: Starting disk-uuid.service... May 13 06:53:07.870510 disk-uuid[471]: Primary Header is updated. May 13 06:53:07.870510 disk-uuid[471]: Secondary Entries is updated. May 13 06:53:07.870510 disk-uuid[471]: Secondary Header is updated. May 13 06:53:07.879975 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 06:53:07.889000 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 06:53:08.891988 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 06:53:08.892093 disk-uuid[472]: The operation has completed successfully. May 13 06:53:08.961720 systemd[1]: disk-uuid.service: Deactivated successfully. May 13 06:53:08.963723 systemd[1]: Finished disk-uuid.service. May 13 06:53:08.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:08.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:08.985757 systemd[1]: Starting verity-setup.service... May 13 06:53:09.026968 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" May 13 06:53:09.127164 systemd[1]: Found device dev-mapper-usr.device. May 13 06:53:09.131302 systemd[1]: Mounting sysusr-usr.mount... May 13 06:53:09.138065 systemd[1]: Finished verity-setup.service. May 13 06:53:09.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:09.272940 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 13 06:53:09.273118 systemd[1]: Mounted sysusr-usr.mount. May 13 06:53:09.274180 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 13 06:53:09.275692 systemd[1]: Starting ignition-setup.service... May 13 06:53:09.277388 systemd[1]: Starting parse-ip-for-networkd.service... May 13 06:53:09.302846 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 06:53:09.303013 kernel: BTRFS info (device vda6): using free space tree May 13 06:53:09.303044 kernel: BTRFS info (device vda6): has skinny extents May 13 06:53:09.334394 systemd[1]: mnt-oem.mount: Deactivated successfully. May 13 06:53:09.352786 systemd[1]: Finished ignition-setup.service. May 13 06:53:09.354814 systemd[1]: Starting ignition-fetch-offline.service... May 13 06:53:09.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:09.412047 systemd[1]: Finished parse-ip-for-networkd.service. May 13 06:53:09.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:09.413000 audit: BPF prog-id=9 op=LOAD May 13 06:53:09.414787 systemd[1]: Starting systemd-networkd.service... May 13 06:53:09.444117 systemd-networkd[641]: lo: Link UP May 13 06:53:09.444128 systemd-networkd[641]: lo: Gained carrier May 13 06:53:09.444827 systemd-networkd[641]: Enumeration completed May 13 06:53:09.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:09.445255 systemd-networkd[641]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 06:53:09.446577 systemd[1]: Started systemd-networkd.service. May 13 06:53:09.447045 systemd-networkd[641]: eth0: Link UP May 13 06:53:09.447050 systemd-networkd[641]: eth0: Gained carrier May 13 06:53:09.450008 systemd[1]: Reached target network.target. May 13 06:53:09.453208 systemd[1]: Starting iscsiuio.service... May 13 06:53:09.464076 systemd[1]: Started iscsiuio.service. May 13 06:53:09.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:09.466119 systemd-networkd[641]: eth0: DHCPv4 address 172.24.4.54/24, gateway 172.24.4.1 acquired from 172.24.4.1 May 13 06:53:09.468639 systemd[1]: Starting iscsid.service... May 13 06:53:09.473283 iscsid[646]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 13 06:53:09.473283 iscsid[646]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 13 06:53:09.473283 iscsid[646]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 13 06:53:09.473283 iscsid[646]: If using hardware iscsi like qla4xxx this message can be ignored. May 13 06:53:09.473283 iscsid[646]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 13 06:53:09.473283 iscsid[646]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 13 06:53:09.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:09.475163 systemd[1]: Started iscsid.service. May 13 06:53:09.477260 systemd[1]: Starting dracut-initqueue.service... May 13 06:53:09.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:09.487847 systemd[1]: Finished dracut-initqueue.service. May 13 06:53:09.488478 systemd[1]: Reached target remote-fs-pre.target. May 13 06:53:09.489342 systemd[1]: Reached target remote-cryptsetup.target. May 13 06:53:09.490717 systemd[1]: Reached target remote-fs.target. May 13 06:53:09.492492 systemd[1]: Starting dracut-pre-mount.service... May 13 06:53:09.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:09.503289 systemd[1]: Finished dracut-pre-mount.service. May 13 06:53:09.697969 ignition[609]: Ignition 2.14.0 May 13 06:53:09.697982 ignition[609]: Stage: fetch-offline May 13 06:53:09.698038 ignition[609]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 06:53:09.700456 systemd[1]: Finished ignition-fetch-offline.service. May 13 06:53:09.698078 ignition[609]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 06:53:09.699037 ignition[609]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 06:53:09.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:09.703850 systemd[1]: Starting ignition-fetch.service... May 13 06:53:09.699138 ignition[609]: parsed url from cmdline: "" May 13 06:53:09.699142 ignition[609]: no config URL provided May 13 06:53:09.699147 ignition[609]: reading system config file "/usr/lib/ignition/user.ign" May 13 06:53:09.699156 ignition[609]: no config at "/usr/lib/ignition/user.ign" May 13 06:53:09.699161 ignition[609]: failed to fetch config: resource requires networking May 13 06:53:09.699478 ignition[609]: Ignition finished successfully May 13 06:53:09.712937 ignition[664]: Ignition 2.14.0 May 13 06:53:09.712945 ignition[664]: Stage: fetch May 13 06:53:09.713061 ignition[664]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 06:53:09.713083 ignition[664]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 06:53:09.714031 ignition[664]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 06:53:09.714118 ignition[664]: parsed url from cmdline: "" May 13 06:53:09.714122 ignition[664]: no config URL provided May 13 06:53:09.714127 ignition[664]: reading system config file "/usr/lib/ignition/user.ign" May 13 06:53:09.714135 ignition[664]: no config at "/usr/lib/ignition/user.ign" May 13 06:53:09.719997 ignition[664]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... May 13 06:53:09.720057 ignition[664]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 May 13 06:53:09.720147 ignition[664]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... May 13 06:53:10.019360 ignition[664]: GET result: OK May 13 06:53:10.019567 ignition[664]: parsing config with SHA512: fd1d10022c568b10ca988eeecd021cc4b644ccd3df4b58756fbb00df0f756bd7f78931fce4d3a36a12950719f167d62e19fe6f26c32cf0d6628a4e14177d2075 May 13 06:53:10.035611 unknown[664]: fetched base config from "system" May 13 06:53:10.037069 unknown[664]: fetched base config from "system" May 13 06:53:10.037107 unknown[664]: fetched user config from "openstack" May 13 06:53:10.038260 ignition[664]: fetch: fetch complete May 13 06:53:10.038274 ignition[664]: fetch: fetch passed May 13 06:53:10.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:10.041996 systemd[1]: Finished ignition-fetch.service. May 13 06:53:10.038384 ignition[664]: Ignition finished successfully May 13 06:53:10.045279 systemd[1]: Starting ignition-kargs.service... May 13 06:53:10.074893 ignition[670]: Ignition 2.14.0 May 13 06:53:10.074991 ignition[670]: Stage: kargs May 13 06:53:10.075223 ignition[670]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 06:53:10.075289 ignition[670]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 06:53:10.077338 ignition[670]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 06:53:10.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:10.082154 systemd[1]: Finished ignition-kargs.service. May 13 06:53:10.079885 ignition[670]: kargs: kargs passed May 13 06:53:10.085660 systemd[1]: Starting ignition-disks.service... May 13 06:53:10.080007 ignition[670]: Ignition finished successfully May 13 06:53:10.106193 ignition[676]: Ignition 2.14.0 May 13 06:53:10.106219 ignition[676]: Stage: disks May 13 06:53:10.106466 ignition[676]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 06:53:10.106512 ignition[676]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 06:53:10.108790 ignition[676]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 06:53:10.111467 ignition[676]: disks: disks passed May 13 06:53:10.113456 systemd[1]: Finished ignition-disks.service. May 13 06:53:10.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:10.111564 ignition[676]: Ignition finished successfully May 13 06:53:10.115702 systemd[1]: Reached target initrd-root-device.target. May 13 06:53:10.118386 systemd[1]: Reached target local-fs-pre.target. May 13 06:53:10.120783 systemd[1]: Reached target local-fs.target. May 13 06:53:10.123460 systemd[1]: Reached target sysinit.target. May 13 06:53:10.125821 systemd[1]: Reached target basic.target. May 13 06:53:10.130070 systemd[1]: Starting systemd-fsck-root.service... May 13 06:53:10.163016 systemd-fsck[684]: ROOT: clean, 619/1628000 files, 124060/1617920 blocks May 13 06:53:10.180091 systemd[1]: Finished systemd-fsck-root.service. May 13 06:53:10.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:10.183355 systemd[1]: Mounting sysroot.mount... May 13 06:53:10.209995 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 13 06:53:10.212364 systemd[1]: Mounted sysroot.mount. May 13 06:53:10.215397 systemd[1]: Reached target initrd-root-fs.target. May 13 06:53:10.219486 systemd[1]: Mounting sysroot-usr.mount... May 13 06:53:10.221578 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 13 06:53:10.223018 systemd[1]: Starting flatcar-openstack-hostname.service... May 13 06:53:10.228734 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 13 06:53:10.228801 systemd[1]: Reached target ignition-diskful.target. May 13 06:53:10.234910 systemd[1]: Mounted sysroot-usr.mount. May 13 06:53:10.247895 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 13 06:53:10.253117 systemd[1]: Starting initrd-setup-root.service... May 13 06:53:10.268660 initrd-setup-root[696]: cut: /sysroot/etc/passwd: No such file or directory May 13 06:53:10.283266 initrd-setup-root[704]: cut: /sysroot/etc/group: No such file or directory May 13 06:53:10.287634 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (691) May 13 06:53:10.294703 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 06:53:10.294756 kernel: BTRFS info (device vda6): using free space tree May 13 06:53:10.294781 kernel: BTRFS info (device vda6): has skinny extents May 13 06:53:10.298045 initrd-setup-root[728]: cut: /sysroot/etc/shadow: No such file or directory May 13 06:53:10.311186 initrd-setup-root[738]: cut: /sysroot/etc/gshadow: No such file or directory May 13 06:53:10.312071 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 13 06:53:10.404444 systemd[1]: Finished initrd-setup-root.service. May 13 06:53:10.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:10.407488 systemd[1]: Starting ignition-mount.service... May 13 06:53:10.410247 systemd[1]: Starting sysroot-boot.service... May 13 06:53:10.427779 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 13 06:53:10.428068 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 13 06:53:10.453188 ignition[759]: INFO : Ignition 2.14.0 May 13 06:53:10.455492 ignition[759]: INFO : Stage: mount May 13 06:53:10.456292 ignition[759]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 06:53:10.457053 ignition[759]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 06:53:10.459043 ignition[759]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 06:53:10.460780 ignition[759]: INFO : mount: mount passed May 13 06:53:10.461348 ignition[759]: INFO : Ignition finished successfully May 13 06:53:10.462513 systemd[1]: Finished ignition-mount.service. May 13 06:53:10.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:10.470025 systemd[1]: Finished sysroot-boot.service. May 13 06:53:10.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:10.479022 coreos-metadata[690]: May 13 06:53:10.478 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 May 13 06:53:10.516298 coreos-metadata[690]: May 13 06:53:10.516 INFO Fetch successful May 13 06:53:10.516860 coreos-metadata[690]: May 13 06:53:10.516 INFO wrote hostname ci-3510-3-7-n-7f05b50207.novalocal to /sysroot/etc/hostname May 13 06:53:10.522387 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. May 13 06:53:10.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:10.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:10.522569 systemd[1]: Finished flatcar-openstack-hostname.service. May 13 06:53:10.525656 systemd[1]: Starting ignition-files.service... May 13 06:53:10.542284 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 13 06:53:10.559004 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (767) May 13 06:53:10.569076 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 06:53:10.569183 kernel: BTRFS info (device vda6): using free space tree May 13 06:53:10.569208 kernel: BTRFS info (device vda6): has skinny extents May 13 06:53:10.584844 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 13 06:53:10.606395 ignition[786]: INFO : Ignition 2.14.0 May 13 06:53:10.606395 ignition[786]: INFO : Stage: files May 13 06:53:10.609232 ignition[786]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 06:53:10.609232 ignition[786]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 06:53:10.609232 ignition[786]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 06:53:10.615651 ignition[786]: DEBUG : files: compiled without relabeling support, skipping May 13 06:53:10.615651 ignition[786]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 13 06:53:10.615651 ignition[786]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 13 06:53:10.620846 ignition[786]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 13 06:53:10.620846 ignition[786]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 13 06:53:10.624522 ignition[786]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 13 06:53:10.624522 ignition[786]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 13 06:53:10.624522 ignition[786]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 May 13 06:53:10.622233 unknown[786]: wrote ssh authorized keys file for user: core May 13 06:53:10.711166 ignition[786]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 13 06:53:11.056718 ignition[786]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 13 06:53:11.058957 ignition[786]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 13 06:53:11.060099 ignition[786]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 13 06:53:11.061393 ignition[786]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 13 06:53:11.061393 ignition[786]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 13 06:53:11.061393 ignition[786]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 13 06:53:11.061393 ignition[786]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 13 06:53:11.061393 ignition[786]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 13 06:53:11.061393 ignition[786]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 13 06:53:11.067454 ignition[786]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 13 06:53:11.067454 ignition[786]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 13 06:53:11.067454 ignition[786]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 13 06:53:11.067454 ignition[786]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 13 06:53:11.067454 ignition[786]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 13 06:53:11.067454 ignition[786]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-x86-64.raw: attempt #1 May 13 06:53:11.352668 systemd-networkd[641]: eth0: Gained IPv6LL May 13 06:53:11.763896 ignition[786]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 13 06:53:13.409257 ignition[786]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 13 06:53:13.409257 ignition[786]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" May 13 06:53:13.409257 ignition[786]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" May 13 06:53:13.409257 ignition[786]: INFO : files: op(c): [started] processing unit "prepare-helm.service" May 13 06:53:13.417632 ignition[786]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 13 06:53:13.417632 ignition[786]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 13 06:53:13.417632 ignition[786]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" May 13 06:53:13.417632 ignition[786]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 13 06:53:13.417632 ignition[786]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 13 06:53:13.417632 ignition[786]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 13 06:53:13.417632 ignition[786]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 13 06:53:13.417632 ignition[786]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" May 13 06:53:13.417632 ignition[786]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" May 13 06:53:13.417632 ignition[786]: INFO : files: files passed May 13 06:53:13.417632 ignition[786]: INFO : Ignition finished successfully May 13 06:53:13.450642 kernel: kauditd_printk_skb: 28 callbacks suppressed May 13 06:53:13.450667 kernel: audit: type=1130 audit(1747119193.422:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.419364 systemd[1]: Finished ignition-files.service. May 13 06:53:13.457194 kernel: audit: type=1130 audit(1747119193.450:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.423155 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 13 06:53:13.440038 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 13 06:53:13.460107 initrd-setup-root-after-ignition[811]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 13 06:53:13.441757 systemd[1]: Starting ignition-quench.service... May 13 06:53:13.474015 kernel: audit: type=1130 audit(1747119193.463:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.474050 kernel: audit: type=1131 audit(1747119193.463:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.450174 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 13 06:53:13.452043 systemd[1]: Reached target ignition-complete.target. May 13 06:53:13.460791 systemd[1]: Starting initrd-parse-etc.service... May 13 06:53:13.462750 systemd[1]: ignition-quench.service: Deactivated successfully. May 13 06:53:13.462992 systemd[1]: Finished ignition-quench.service. May 13 06:53:13.488767 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 13 06:53:13.511664 kernel: audit: type=1130 audit(1747119193.488:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.511712 kernel: audit: type=1131 audit(1747119193.488:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.488869 systemd[1]: Finished initrd-parse-etc.service. May 13 06:53:13.489577 systemd[1]: Reached target initrd-fs.target. May 13 06:53:13.512070 systemd[1]: Reached target initrd.target. May 13 06:53:13.513355 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 13 06:53:13.514149 systemd[1]: Starting dracut-pre-pivot.service... May 13 06:53:13.526898 systemd[1]: Finished dracut-pre-pivot.service. May 13 06:53:13.532731 kernel: audit: type=1130 audit(1747119193.526:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.528258 systemd[1]: Starting initrd-cleanup.service... May 13 06:53:13.541472 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 13 06:53:13.551619 kernel: audit: type=1130 audit(1747119193.541:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.551650 kernel: audit: type=1131 audit(1747119193.541:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.541567 systemd[1]: Finished initrd-cleanup.service. May 13 06:53:13.542740 systemd[1]: Stopped target nss-lookup.target. May 13 06:53:13.552058 systemd[1]: Stopped target remote-cryptsetup.target. May 13 06:53:13.553031 systemd[1]: Stopped target timers.target. May 13 06:53:13.560216 kernel: audit: type=1131 audit(1747119193.553:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.553949 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 13 06:53:13.553992 systemd[1]: Stopped dracut-pre-pivot.service. May 13 06:53:13.554948 systemd[1]: Stopped target initrd.target. May 13 06:53:13.560601 systemd[1]: Stopped target basic.target. May 13 06:53:13.561555 systemd[1]: Stopped target ignition-complete.target. May 13 06:53:13.562479 systemd[1]: Stopped target ignition-diskful.target. May 13 06:53:13.563398 systemd[1]: Stopped target initrd-root-device.target. May 13 06:53:13.564301 systemd[1]: Stopped target remote-fs.target. May 13 06:53:13.565200 systemd[1]: Stopped target remote-fs-pre.target. May 13 06:53:13.566226 systemd[1]: Stopped target sysinit.target. May 13 06:53:13.567194 systemd[1]: Stopped target local-fs.target. May 13 06:53:13.568224 systemd[1]: Stopped target local-fs-pre.target. May 13 06:53:13.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.569232 systemd[1]: Stopped target swap.target. May 13 06:53:13.570180 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 13 06:53:13.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.570224 systemd[1]: Stopped dracut-pre-mount.service. May 13 06:53:13.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.571212 systemd[1]: Stopped target cryptsetup.target. May 13 06:53:13.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.572232 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 13 06:53:13.572270 systemd[1]: Stopped dracut-initqueue.service. May 13 06:53:13.573244 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 13 06:53:13.573281 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 13 06:53:13.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.574249 systemd[1]: ignition-files.service: Deactivated successfully. May 13 06:53:13.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.588394 iscsid[646]: iscsid shutting down. May 13 06:53:13.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.574286 systemd[1]: Stopped ignition-files.service. May 13 06:53:13.575848 systemd[1]: Stopping ignition-mount.service... May 13 06:53:13.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.580456 systemd[1]: Stopping iscsid.service... May 13 06:53:13.580952 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 13 06:53:13.581010 systemd[1]: Stopped kmod-static-nodes.service. May 13 06:53:13.582420 systemd[1]: Stopping sysroot-boot.service... May 13 06:53:13.584015 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 13 06:53:13.584205 systemd[1]: Stopped systemd-udev-trigger.service. May 13 06:53:13.587203 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 13 06:53:13.587334 systemd[1]: Stopped dracut-pre-trigger.service. May 13 06:53:13.591109 systemd[1]: iscsid.service: Deactivated successfully. May 13 06:53:13.591283 systemd[1]: Stopped iscsid.service. May 13 06:53:13.594579 systemd[1]: Stopping iscsiuio.service... May 13 06:53:13.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.596765 systemd[1]: iscsiuio.service: Deactivated successfully. May 13 06:53:13.605989 ignition[824]: INFO : Ignition 2.14.0 May 13 06:53:13.605989 ignition[824]: INFO : Stage: umount May 13 06:53:13.605989 ignition[824]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 06:53:13.605989 ignition[824]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 06:53:13.596859 systemd[1]: Stopped iscsiuio.service. May 13 06:53:13.609518 ignition[824]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 06:53:13.611131 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 13 06:53:13.614710 ignition[824]: INFO : umount: umount passed May 13 06:53:13.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.624139 ignition[824]: INFO : Ignition finished successfully May 13 06:53:13.615720 systemd[1]: ignition-mount.service: Deactivated successfully. May 13 06:53:13.615804 systemd[1]: Stopped ignition-mount.service. May 13 06:53:13.616686 systemd[1]: ignition-disks.service: Deactivated successfully. May 13 06:53:13.616726 systemd[1]: Stopped ignition-disks.service. May 13 06:53:13.617240 systemd[1]: ignition-kargs.service: Deactivated successfully. May 13 06:53:13.617276 systemd[1]: Stopped ignition-kargs.service. May 13 06:53:13.620491 systemd[1]: ignition-fetch.service: Deactivated successfully. May 13 06:53:13.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.620529 systemd[1]: Stopped ignition-fetch.service. May 13 06:53:13.622457 systemd[1]: Stopped target network.target. May 13 06:53:13.622876 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 13 06:53:13.622934 systemd[1]: Stopped ignition-fetch-offline.service. May 13 06:53:13.623485 systemd[1]: Stopped target paths.target. May 13 06:53:13.623893 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 13 06:53:13.625996 systemd[1]: Stopped systemd-ask-password-console.path. May 13 06:53:13.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.626707 systemd[1]: Stopped target slices.target. May 13 06:53:13.627193 systemd[1]: Stopped target sockets.target. May 13 06:53:13.627736 systemd[1]: iscsid.socket: Deactivated successfully. May 13 06:53:13.627770 systemd[1]: Closed iscsid.socket. May 13 06:53:13.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.628747 systemd[1]: iscsiuio.socket: Deactivated successfully. May 13 06:53:13.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.628779 systemd[1]: Closed iscsiuio.socket. May 13 06:53:13.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.629703 systemd[1]: ignition-setup.service: Deactivated successfully. May 13 06:53:13.629740 systemd[1]: Stopped ignition-setup.service. May 13 06:53:13.630797 systemd[1]: Stopping systemd-networkd.service... May 13 06:53:13.631980 systemd[1]: Stopping systemd-resolved.service... May 13 06:53:13.635017 systemd-networkd[641]: eth0: DHCPv6 lease lost May 13 06:53:13.647000 audit: BPF prog-id=9 op=UNLOAD May 13 06:53:13.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.636665 systemd[1]: systemd-networkd.service: Deactivated successfully. May 13 06:53:13.649000 audit: BPF prog-id=6 op=UNLOAD May 13 06:53:13.636752 systemd[1]: Stopped systemd-networkd.service. May 13 06:53:13.638611 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 13 06:53:13.638645 systemd[1]: Closed systemd-networkd.socket. May 13 06:53:13.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.640415 systemd[1]: Stopping network-cleanup.service... May 13 06:53:13.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.642379 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 13 06:53:13.642428 systemd[1]: Stopped parse-ip-for-networkd.service. May 13 06:53:13.643437 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 13 06:53:13.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.643478 systemd[1]: Stopped systemd-sysctl.service. May 13 06:53:13.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.644592 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 13 06:53:13.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.644631 systemd[1]: Stopped systemd-modules-load.service. May 13 06:53:13.645458 systemd[1]: Stopping systemd-udevd.service... May 13 06:53:13.647366 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 13 06:53:13.647812 systemd[1]: systemd-resolved.service: Deactivated successfully. May 13 06:53:13.647911 systemd[1]: Stopped systemd-resolved.service. May 13 06:53:13.651747 systemd[1]: systemd-udevd.service: Deactivated successfully. May 13 06:53:13.651879 systemd[1]: Stopped systemd-udevd.service. May 13 06:53:13.653480 systemd[1]: network-cleanup.service: Deactivated successfully. May 13 06:53:13.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.653566 systemd[1]: Stopped network-cleanup.service. May 13 06:53:13.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.654324 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 13 06:53:13.654360 systemd[1]: Closed systemd-udevd-control.socket. May 13 06:53:13.655180 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 13 06:53:13.655209 systemd[1]: Closed systemd-udevd-kernel.socket. May 13 06:53:13.656270 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 13 06:53:13.656307 systemd[1]: Stopped dracut-pre-udev.service. May 13 06:53:13.657263 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 13 06:53:13.657297 systemd[1]: Stopped dracut-cmdline.service. May 13 06:53:13.658244 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 13 06:53:13.658279 systemd[1]: Stopped dracut-cmdline-ask.service. May 13 06:53:13.659851 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 13 06:53:13.660410 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 13 06:53:13.660461 systemd[1]: Stopped systemd-vconsole-setup.service. May 13 06:53:13.667040 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 13 06:53:13.667134 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 13 06:53:13.910571 systemd[1]: sysroot-boot.service: Deactivated successfully. May 13 06:53:13.910787 systemd[1]: Stopped sysroot-boot.service. May 13 06:53:13.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.913039 systemd[1]: Reached target initrd-switch-root.target. May 13 06:53:13.914528 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 13 06:53:13.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:13.914630 systemd[1]: Stopped initrd-setup-root.service. May 13 06:53:13.917997 systemd[1]: Starting initrd-switch-root.service... May 13 06:53:13.960012 systemd[1]: Switching root. May 13 06:53:13.993568 systemd-journald[186]: Journal stopped May 13 06:53:18.096991 systemd-journald[186]: Received SIGTERM from PID 1 (systemd). May 13 06:53:18.097037 kernel: SELinux: Class mctp_socket not defined in policy. May 13 06:53:18.097055 kernel: SELinux: Class anon_inode not defined in policy. May 13 06:53:18.097066 kernel: SELinux: the above unknown classes and permissions will be allowed May 13 06:53:18.097077 kernel: SELinux: policy capability network_peer_controls=1 May 13 06:53:18.097088 kernel: SELinux: policy capability open_perms=1 May 13 06:53:18.097099 kernel: SELinux: policy capability extended_socket_class=1 May 13 06:53:18.097109 kernel: SELinux: policy capability always_check_network=0 May 13 06:53:18.097120 kernel: SELinux: policy capability cgroup_seclabel=1 May 13 06:53:18.097130 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 13 06:53:18.097142 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 13 06:53:18.097152 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 13 06:53:18.097163 systemd[1]: Successfully loaded SELinux policy in 97.462ms. May 13 06:53:18.097181 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 21.259ms. May 13 06:53:18.097197 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 06:53:18.097211 systemd[1]: Detected virtualization kvm. May 13 06:53:18.097223 systemd[1]: Detected architecture x86-64. May 13 06:53:18.097234 systemd[1]: Detected first boot. May 13 06:53:18.097245 systemd[1]: Hostname set to . May 13 06:53:18.097257 systemd[1]: Initializing machine ID from VM UUID. May 13 06:53:18.097269 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 13 06:53:18.097283 systemd[1]: Populated /etc with preset unit settings. May 13 06:53:18.097296 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 06:53:18.097311 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 06:53:18.097324 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 06:53:18.097336 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 13 06:53:18.097347 systemd[1]: Stopped initrd-switch-root.service. May 13 06:53:18.097359 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 13 06:53:18.097371 systemd[1]: Created slice system-addon\x2dconfig.slice. May 13 06:53:18.097386 systemd[1]: Created slice system-addon\x2drun.slice. May 13 06:53:18.097398 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 13 06:53:18.097410 systemd[1]: Created slice system-getty.slice. May 13 06:53:18.097421 systemd[1]: Created slice system-modprobe.slice. May 13 06:53:18.097433 systemd[1]: Created slice system-serial\x2dgetty.slice. May 13 06:53:18.097445 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 13 06:53:18.097456 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 13 06:53:18.097468 systemd[1]: Created slice user.slice. May 13 06:53:18.097479 systemd[1]: Started systemd-ask-password-console.path. May 13 06:53:18.097492 systemd[1]: Started systemd-ask-password-wall.path. May 13 06:53:18.097503 systemd[1]: Set up automount boot.automount. May 13 06:53:18.097515 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 13 06:53:18.097527 systemd[1]: Stopped target initrd-switch-root.target. May 13 06:53:18.097539 systemd[1]: Stopped target initrd-fs.target. May 13 06:53:18.097550 systemd[1]: Stopped target initrd-root-fs.target. May 13 06:53:18.097563 systemd[1]: Reached target integritysetup.target. May 13 06:53:18.097574 systemd[1]: Reached target remote-cryptsetup.target. May 13 06:53:18.097586 systemd[1]: Reached target remote-fs.target. May 13 06:53:18.097598 systemd[1]: Reached target slices.target. May 13 06:53:18.097609 systemd[1]: Reached target swap.target. May 13 06:53:18.097620 systemd[1]: Reached target torcx.target. May 13 06:53:18.097631 systemd[1]: Reached target veritysetup.target. May 13 06:53:18.097643 systemd[1]: Listening on systemd-coredump.socket. May 13 06:53:18.097655 systemd[1]: Listening on systemd-initctl.socket. May 13 06:53:18.097666 systemd[1]: Listening on systemd-networkd.socket. May 13 06:53:18.097679 systemd[1]: Listening on systemd-udevd-control.socket. May 13 06:53:18.097690 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 06:53:18.097702 systemd[1]: Listening on systemd-userdbd.socket. May 13 06:53:18.097713 systemd[1]: Mounting dev-hugepages.mount... May 13 06:53:18.097725 systemd[1]: Mounting dev-mqueue.mount... May 13 06:53:18.097736 systemd[1]: Mounting media.mount... May 13 06:53:18.097748 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 06:53:18.097762 systemd[1]: Mounting sys-kernel-debug.mount... May 13 06:53:18.097774 systemd[1]: Mounting sys-kernel-tracing.mount... May 13 06:53:18.097787 systemd[1]: Mounting tmp.mount... May 13 06:53:18.097798 systemd[1]: Starting flatcar-tmpfiles.service... May 13 06:53:18.097810 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 06:53:18.097821 systemd[1]: Starting kmod-static-nodes.service... May 13 06:53:18.097833 systemd[1]: Starting modprobe@configfs.service... May 13 06:53:18.097844 systemd[1]: Starting modprobe@dm_mod.service... May 13 06:53:18.097856 systemd[1]: Starting modprobe@drm.service... May 13 06:53:18.097867 systemd[1]: Starting modprobe@efi_pstore.service... May 13 06:53:18.097879 systemd[1]: Starting modprobe@fuse.service... May 13 06:53:18.097892 systemd[1]: Starting modprobe@loop.service... May 13 06:53:18.097903 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 13 06:53:18.097934 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 13 06:53:18.097947 systemd[1]: Stopped systemd-fsck-root.service. May 13 06:53:18.097958 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 13 06:53:18.097970 systemd[1]: Stopped systemd-fsck-usr.service. May 13 06:53:18.097981 systemd[1]: Stopped systemd-journald.service. May 13 06:53:18.097993 systemd[1]: Starting systemd-journald.service... May 13 06:53:18.098004 systemd[1]: Starting systemd-modules-load.service... May 13 06:53:18.098017 systemd[1]: Starting systemd-network-generator.service... May 13 06:53:18.098029 systemd[1]: Starting systemd-remount-fs.service... May 13 06:53:18.098040 systemd[1]: Starting systemd-udev-trigger.service... May 13 06:53:18.098051 systemd[1]: verity-setup.service: Deactivated successfully. May 13 06:53:18.098063 systemd[1]: Stopped verity-setup.service. May 13 06:53:18.098075 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 06:53:18.098087 systemd[1]: Mounted dev-hugepages.mount. May 13 06:53:18.098098 systemd[1]: Mounted dev-mqueue.mount. May 13 06:53:18.098110 systemd[1]: Mounted media.mount. May 13 06:53:18.098128 systemd-journald[927]: Journal started May 13 06:53:18.098170 systemd-journald[927]: Runtime Journal (/run/log/journal/c8b3f81f7a444c51adffac6799972907) is 8.0M, max 78.4M, 70.4M free. May 13 06:53:14.327000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 13 06:53:14.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 06:53:14.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 06:53:14.463000 audit: BPF prog-id=10 op=LOAD May 13 06:53:14.463000 audit: BPF prog-id=10 op=UNLOAD May 13 06:53:14.463000 audit: BPF prog-id=11 op=LOAD May 13 06:53:14.463000 audit: BPF prog-id=11 op=UNLOAD May 13 06:53:14.622000 audit[857]: AVC avc: denied { associate } for pid=857 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 13 06:53:14.622000 audit[857]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178c2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=840 pid=857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:14.622000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 06:53:14.625000 audit[857]: AVC avc: denied { associate } for pid=857 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 13 06:53:14.625000 audit[857]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000117999 a2=1ed a3=0 items=2 ppid=840 pid=857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:14.625000 audit: CWD cwd="/" May 13 06:53:14.625000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:14.625000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:14.625000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 06:53:17.894000 audit: BPF prog-id=12 op=LOAD May 13 06:53:17.894000 audit: BPF prog-id=3 op=UNLOAD May 13 06:53:17.894000 audit: BPF prog-id=13 op=LOAD May 13 06:53:17.894000 audit: BPF prog-id=14 op=LOAD May 13 06:53:17.894000 audit: BPF prog-id=4 op=UNLOAD May 13 06:53:17.894000 audit: BPF prog-id=5 op=UNLOAD May 13 06:53:17.896000 audit: BPF prog-id=15 op=LOAD May 13 06:53:17.896000 audit: BPF prog-id=12 op=UNLOAD May 13 06:53:17.896000 audit: BPF prog-id=16 op=LOAD May 13 06:53:17.896000 audit: BPF prog-id=17 op=LOAD May 13 06:53:17.896000 audit: BPF prog-id=13 op=UNLOAD May 13 06:53:17.896000 audit: BPF prog-id=14 op=UNLOAD May 13 06:53:17.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:17.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:17.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:17.908000 audit: BPF prog-id=15 op=UNLOAD May 13 06:53:18.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.056000 audit: BPF prog-id=18 op=LOAD May 13 06:53:18.056000 audit: BPF prog-id=19 op=LOAD May 13 06:53:18.056000 audit: BPF prog-id=20 op=LOAD May 13 06:53:18.056000 audit: BPF prog-id=16 op=UNLOAD May 13 06:53:18.056000 audit: BPF prog-id=17 op=UNLOAD May 13 06:53:18.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.094000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 13 06:53:18.094000 audit[927]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffcc6299ac0 a2=4000 a3=7ffcc6299b5c items=0 ppid=1 pid=927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:18.094000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 13 06:53:17.893986 systemd[1]: Queued start job for default target multi-user.target. May 13 06:53:14.618569 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-13T06:53:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 06:53:17.893998 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 13 06:53:14.619615 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-13T06:53:14Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 06:53:17.897881 systemd[1]: systemd-journald.service: Deactivated successfully. May 13 06:53:14.619637 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-13T06:53:14Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 06:53:14.619671 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-13T06:53:14Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 13 06:53:14.619683 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-13T06:53:14Z" level=debug msg="skipped missing lower profile" missing profile=oem May 13 06:53:14.619714 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-13T06:53:14Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 13 06:53:14.619729 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-13T06:53:14Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 13 06:53:14.619970 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-13T06:53:14Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 13 06:53:14.620011 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-13T06:53:14Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 06:53:14.620026 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-13T06:53:14Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 06:53:14.622047 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-13T06:53:14Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 13 06:53:14.622085 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-13T06:53:14Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 13 06:53:14.622106 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-13T06:53:14Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 13 06:53:18.104553 systemd[1]: Started systemd-journald.service. May 13 06:53:18.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:14.622123 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-13T06:53:14Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 13 06:53:18.101229 systemd[1]: Mounted sys-kernel-debug.mount. May 13 06:53:18.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:14.622143 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-13T06:53:14Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 13 06:53:18.102059 systemd[1]: Mounted sys-kernel-tracing.mount. May 13 06:53:14.622158 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-13T06:53:14Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 13 06:53:18.103068 systemd[1]: Mounted tmp.mount. May 13 06:53:17.482350 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-13T06:53:17Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 06:53:18.103708 systemd[1]: Finished kmod-static-nodes.service. May 13 06:53:17.482667 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-13T06:53:17Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 06:53:18.104964 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 13 06:53:17.482793 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-13T06:53:17Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 06:53:18.105089 systemd[1]: Finished modprobe@configfs.service. May 13 06:53:18.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:17.483686 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-13T06:53:17Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 06:53:18.105880 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 06:53:17.483842 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-13T06:53:17Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 13 06:53:18.106006 systemd[1]: Finished modprobe@dm_mod.service. May 13 06:53:17.484071 /usr/lib/systemd/system-generators/torcx-generator[857]: time="2025-05-13T06:53:17Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 13 06:53:18.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.107197 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 06:53:18.107332 systemd[1]: Finished modprobe@drm.service. May 13 06:53:18.108593 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 06:53:18.108704 systemd[1]: Finished modprobe@efi_pstore.service. May 13 06:53:18.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.109878 systemd[1]: Finished systemd-modules-load.service. May 13 06:53:18.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.112683 systemd[1]: Finished systemd-network-generator.service. May 13 06:53:18.112943 kernel: loop: module loaded May 13 06:53:18.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.113390 systemd[1]: Finished systemd-remount-fs.service. May 13 06:53:18.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.114294 systemd[1]: Reached target network-pre.target. May 13 06:53:18.117033 systemd[1]: Mounting sys-kernel-config.mount... May 13 06:53:18.117518 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 13 06:53:18.128402 systemd[1]: Starting systemd-hwdb-update.service... May 13 06:53:18.130057 systemd[1]: Starting systemd-journal-flush.service... May 13 06:53:18.130663 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 06:53:18.131842 systemd[1]: Starting systemd-random-seed.service... May 13 06:53:18.133977 systemd[1]: Starting systemd-sysctl.service... May 13 06:53:18.138222 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 06:53:18.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.138361 systemd[1]: Finished modprobe@loop.service. May 13 06:53:18.139003 systemd[1]: Mounted sys-kernel-config.mount. May 13 06:53:18.140097 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 06:53:18.147036 systemd-journald[927]: Time spent on flushing to /var/log/journal/c8b3f81f7a444c51adffac6799972907 is 26.324ms for 1092 entries. May 13 06:53:18.147036 systemd-journald[927]: System Journal (/var/log/journal/c8b3f81f7a444c51adffac6799972907) is 8.0M, max 584.8M, 576.8M free. May 13 06:53:18.194685 systemd-journald[927]: Received client request to flush runtime journal. May 13 06:53:18.194727 kernel: fuse: init (API version 7.34) May 13 06:53:18.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.162673 systemd[1]: Finished systemd-random-seed.service. May 13 06:53:18.163565 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 13 06:53:18.163680 systemd[1]: Finished modprobe@fuse.service. May 13 06:53:18.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.164282 systemd[1]: Reached target first-boot-complete.target. May 13 06:53:18.166185 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 13 06:53:18.170882 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 13 06:53:18.179172 systemd[1]: Finished systemd-sysctl.service. May 13 06:53:18.180710 systemd[1]: Finished flatcar-tmpfiles.service. May 13 06:53:18.182338 systemd[1]: Starting systemd-sysusers.service... May 13 06:53:18.195722 systemd[1]: Finished systemd-journal-flush.service. May 13 06:53:18.225465 systemd[1]: Finished systemd-udev-trigger.service. May 13 06:53:18.227079 systemd[1]: Starting systemd-udev-settle.service... May 13 06:53:18.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.240224 systemd[1]: Finished systemd-sysusers.service. May 13 06:53:18.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.241196 udevadm[969]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 13 06:53:18.794371 systemd[1]: Finished systemd-hwdb-update.service. May 13 06:53:18.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.798988 kernel: kauditd_printk_skb: 100 callbacks suppressed May 13 06:53:18.799068 kernel: audit: type=1130 audit(1747119198.795:140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.811000 audit: BPF prog-id=21 op=LOAD May 13 06:53:18.815466 kernel: audit: type=1334 audit(1747119198.811:141): prog-id=21 op=LOAD May 13 06:53:18.815000 audit: BPF prog-id=22 op=LOAD May 13 06:53:18.819662 kernel: audit: type=1334 audit(1747119198.815:142): prog-id=22 op=LOAD May 13 06:53:18.819746 kernel: audit: type=1334 audit(1747119198.815:143): prog-id=7 op=UNLOAD May 13 06:53:18.815000 audit: BPF prog-id=7 op=UNLOAD May 13 06:53:18.820243 systemd[1]: Starting systemd-udevd.service... May 13 06:53:18.823726 kernel: audit: type=1334 audit(1747119198.815:144): prog-id=8 op=UNLOAD May 13 06:53:18.815000 audit: BPF prog-id=8 op=UNLOAD May 13 06:53:18.849644 systemd-udevd[970]: Using default interface naming scheme 'v252'. May 13 06:53:18.885329 systemd[1]: Started systemd-udevd.service. May 13 06:53:18.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.898970 kernel: audit: type=1130 audit(1747119198.884:145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:18.899221 systemd[1]: Starting systemd-networkd.service... May 13 06:53:18.897000 audit: BPF prog-id=23 op=LOAD May 13 06:53:18.906981 kernel: audit: type=1334 audit(1747119198.897:146): prog-id=23 op=LOAD May 13 06:53:18.929497 kernel: audit: type=1334 audit(1747119198.911:147): prog-id=24 op=LOAD May 13 06:53:18.929600 kernel: audit: type=1334 audit(1747119198.915:148): prog-id=25 op=LOAD May 13 06:53:18.911000 audit: BPF prog-id=24 op=LOAD May 13 06:53:18.915000 audit: BPF prog-id=25 op=LOAD May 13 06:53:18.930544 systemd[1]: Starting systemd-userdbd.service... May 13 06:53:18.928000 audit: BPF prog-id=26 op=LOAD May 13 06:53:18.939954 kernel: audit: type=1334 audit(1747119198.928:149): prog-id=26 op=LOAD May 13 06:53:18.970241 systemd[1]: Started systemd-userdbd.service. May 13 06:53:18.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:19.000159 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 13 06:53:19.062946 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 13 06:53:19.071938 kernel: ACPI: button: Power Button [PWRF] May 13 06:53:19.078896 systemd-networkd[971]: lo: Link UP May 13 06:53:19.078908 systemd-networkd[971]: lo: Gained carrier May 13 06:53:19.080020 systemd-networkd[971]: Enumeration completed May 13 06:53:19.080104 systemd[1]: Started systemd-networkd.service. May 13 06:53:19.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:19.080761 systemd-networkd[971]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 06:53:19.082509 systemd-networkd[971]: eth0: Link UP May 13 06:53:19.082518 systemd-networkd[971]: eth0: Gained carrier May 13 06:53:19.091042 systemd-networkd[971]: eth0: DHCPv4 address 172.24.4.54/24, gateway 172.24.4.1 acquired from 172.24.4.1 May 13 06:53:19.085000 audit[978]: AVC avc: denied { confidentiality } for pid=978 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 13 06:53:19.085000 audit[978]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55eb8dd675e0 a1=338ac a2=7f26db865bc5 a3=5 items=110 ppid=970 pid=978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:19.085000 audit: CWD cwd="/" May 13 06:53:19.085000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=1 name=(null) inode=14361 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=2 name=(null) inode=14361 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=3 name=(null) inode=14362 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=4 name=(null) inode=14361 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=5 name=(null) inode=14363 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=6 name=(null) inode=14361 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=7 name=(null) inode=14364 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=8 name=(null) inode=14364 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=9 name=(null) inode=14365 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=10 name=(null) inode=14364 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=11 name=(null) inode=14366 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=12 name=(null) inode=14364 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=13 name=(null) inode=14367 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=14 name=(null) inode=14364 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=15 name=(null) inode=14368 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=16 name=(null) inode=14364 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.117879 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 06:53:19.085000 audit: PATH item=17 name=(null) inode=14369 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=18 name=(null) inode=14361 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=19 name=(null) inode=14370 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=20 name=(null) inode=14370 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=21 name=(null) inode=14371 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=22 name=(null) inode=14370 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=23 name=(null) inode=14372 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=24 name=(null) inode=14370 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=25 name=(null) inode=14373 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=26 name=(null) inode=14370 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=27 name=(null) inode=14374 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=28 name=(null) inode=14370 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=29 name=(null) inode=14375 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=30 name=(null) inode=14361 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=31 name=(null) inode=14376 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=32 name=(null) inode=14376 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=33 name=(null) inode=14377 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=34 name=(null) inode=14376 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=35 name=(null) inode=14378 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=36 name=(null) inode=14376 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=37 name=(null) inode=14379 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=38 name=(null) inode=14376 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=39 name=(null) inode=14380 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=40 name=(null) inode=14376 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=41 name=(null) inode=14381 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=42 name=(null) inode=14361 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=43 name=(null) inode=14382 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=44 name=(null) inode=14382 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=45 name=(null) inode=14383 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=46 name=(null) inode=14382 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=47 name=(null) inode=14384 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=48 name=(null) inode=14382 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=49 name=(null) inode=14385 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=50 name=(null) inode=14382 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=51 name=(null) inode=14386 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=52 name=(null) inode=14382 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=53 name=(null) inode=14387 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=55 name=(null) inode=14388 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=56 name=(null) inode=14388 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=57 name=(null) inode=14389 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=58 name=(null) inode=14388 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=59 name=(null) inode=14390 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=60 name=(null) inode=14388 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=61 name=(null) inode=14391 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=62 name=(null) inode=14391 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=63 name=(null) inode=14392 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=64 name=(null) inode=14391 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=65 name=(null) inode=14393 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=66 name=(null) inode=14391 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=67 name=(null) inode=14394 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=68 name=(null) inode=14391 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=69 name=(null) inode=14395 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=70 name=(null) inode=14391 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=71 name=(null) inode=14396 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=72 name=(null) inode=14388 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=73 name=(null) inode=14397 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=74 name=(null) inode=14397 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=75 name=(null) inode=14398 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=76 name=(null) inode=14397 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=77 name=(null) inode=14399 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=78 name=(null) inode=14397 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=79 name=(null) inode=14400 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=80 name=(null) inode=14397 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=81 name=(null) inode=14401 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=82 name=(null) inode=14397 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=83 name=(null) inode=14402 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=84 name=(null) inode=14388 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=85 name=(null) inode=14403 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=86 name=(null) inode=14403 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=87 name=(null) inode=14404 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=88 name=(null) inode=14403 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=89 name=(null) inode=14405 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=90 name=(null) inode=14403 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=91 name=(null) inode=14406 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=92 name=(null) inode=14403 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=93 name=(null) inode=14407 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=94 name=(null) inode=14403 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=95 name=(null) inode=14408 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=96 name=(null) inode=14388 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=97 name=(null) inode=14409 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=98 name=(null) inode=14409 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=99 name=(null) inode=14410 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=100 name=(null) inode=14409 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=101 name=(null) inode=14411 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=102 name=(null) inode=14409 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=103 name=(null) inode=14412 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=104 name=(null) inode=14409 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=105 name=(null) inode=14413 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=106 name=(null) inode=14409 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=107 name=(null) inode=14414 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PATH item=109 name=(null) inode=14415 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:53:19.085000 audit: PROCTITLE proctitle="(udev-worker)" May 13 06:53:19.127931 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 May 13 06:53:19.134932 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 13 06:53:19.138944 kernel: mousedev: PS/2 mouse device common for all mice May 13 06:53:19.183322 systemd[1]: Finished systemd-udev-settle.service. May 13 06:53:19.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:19.185022 systemd[1]: Starting lvm2-activation-early.service... May 13 06:53:19.223254 lvm[1004]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 06:53:19.262847 systemd[1]: Finished lvm2-activation-early.service. May 13 06:53:19.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:19.264271 systemd[1]: Reached target cryptsetup.target. May 13 06:53:19.267317 systemd[1]: Starting lvm2-activation.service... May 13 06:53:19.276371 lvm[1005]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 06:53:19.316079 systemd[1]: Finished lvm2-activation.service. May 13 06:53:19.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:19.317415 systemd[1]: Reached target local-fs-pre.target. May 13 06:53:19.318484 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 13 06:53:19.318537 systemd[1]: Reached target local-fs.target. May 13 06:53:19.319593 systemd[1]: Reached target machines.target. May 13 06:53:19.323003 systemd[1]: Starting ldconfig.service... May 13 06:53:19.325698 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 06:53:19.325789 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 06:53:19.328034 systemd[1]: Starting systemd-boot-update.service... May 13 06:53:19.331838 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 13 06:53:19.340291 systemd[1]: Starting systemd-machine-id-commit.service... May 13 06:53:19.348133 systemd[1]: Starting systemd-sysext.service... May 13 06:53:19.351760 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1007 (bootctl) May 13 06:53:19.356218 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 13 06:53:19.376429 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 13 06:53:19.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:19.388526 systemd[1]: Unmounting usr-share-oem.mount... May 13 06:53:19.399305 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 13 06:53:19.399567 systemd[1]: Unmounted usr-share-oem.mount. May 13 06:53:19.420957 kernel: loop0: detected capacity change from 0 to 218376 May 13 06:53:19.683239 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 13 06:53:19.684580 systemd[1]: Finished systemd-machine-id-commit.service. May 13 06:53:19.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:19.739001 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 13 06:53:19.774027 kernel: loop1: detected capacity change from 0 to 218376 May 13 06:53:19.829885 (sd-sysext)[1021]: Using extensions 'kubernetes'. May 13 06:53:19.831578 systemd-fsck[1018]: fsck.fat 4.2 (2021-01-31) May 13 06:53:19.831578 systemd-fsck[1018]: /dev/vda1: 790 files, 120692/258078 clusters May 13 06:53:19.833333 (sd-sysext)[1021]: Merged extensions into '/usr'. May 13 06:53:19.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:19.839335 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 13 06:53:19.843862 systemd[1]: Mounting boot.mount... May 13 06:53:19.881825 systemd[1]: Mounted boot.mount. May 13 06:53:19.883634 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 06:53:19.885903 systemd[1]: Mounting usr-share-oem.mount... May 13 06:53:19.886652 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 06:53:19.887985 systemd[1]: Starting modprobe@dm_mod.service... May 13 06:53:19.890043 systemd[1]: Starting modprobe@efi_pstore.service... May 13 06:53:19.892344 systemd[1]: Starting modprobe@loop.service... May 13 06:53:19.893155 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 06:53:19.893279 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 06:53:19.893426 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 06:53:19.895617 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 06:53:19.895859 systemd[1]: Finished modprobe@dm_mod.service. May 13 06:53:19.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:19.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:19.897710 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 06:53:19.898117 systemd[1]: Finished modprobe@efi_pstore.service. May 13 06:53:19.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:19.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:19.902499 systemd[1]: Mounted usr-share-oem.mount. May 13 06:53:19.904228 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 06:53:19.904447 systemd[1]: Finished modprobe@loop.service. May 13 06:53:19.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:19.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:19.907760 systemd[1]: Finished systemd-sysext.service. May 13 06:53:19.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:19.912093 systemd[1]: Starting ensure-sysext.service... May 13 06:53:19.912798 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 06:53:19.912977 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 06:53:19.914244 systemd[1]: Starting systemd-tmpfiles-setup.service... May 13 06:53:19.915333 systemd[1]: Finished systemd-boot-update.service. May 13 06:53:19.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:19.926984 systemd[1]: Reloading. May 13 06:53:19.946900 systemd-tmpfiles[1029]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 13 06:53:19.958786 systemd-tmpfiles[1029]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 13 06:53:19.978773 systemd-tmpfiles[1029]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 13 06:53:20.013753 /usr/lib/systemd/system-generators/torcx-generator[1049]: time="2025-05-13T06:53:20Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 06:53:20.013787 /usr/lib/systemd/system-generators/torcx-generator[1049]: time="2025-05-13T06:53:20Z" level=info msg="torcx already run" May 13 06:53:20.109494 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 06:53:20.109683 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 06:53:20.136045 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 06:53:20.207000 audit: BPF prog-id=27 op=LOAD May 13 06:53:20.207000 audit: BPF prog-id=24 op=UNLOAD May 13 06:53:20.207000 audit: BPF prog-id=28 op=LOAD May 13 06:53:20.207000 audit: BPF prog-id=29 op=LOAD May 13 06:53:20.207000 audit: BPF prog-id=25 op=UNLOAD May 13 06:53:20.207000 audit: BPF prog-id=26 op=UNLOAD May 13 06:53:20.208000 audit: BPF prog-id=30 op=LOAD May 13 06:53:20.208000 audit: BPF prog-id=23 op=UNLOAD May 13 06:53:20.211000 audit: BPF prog-id=31 op=LOAD May 13 06:53:20.211000 audit: BPF prog-id=32 op=LOAD May 13 06:53:20.211000 audit: BPF prog-id=21 op=UNLOAD May 13 06:53:20.211000 audit: BPF prog-id=22 op=UNLOAD May 13 06:53:20.213000 audit: BPF prog-id=33 op=LOAD May 13 06:53:20.214000 audit: BPF prog-id=18 op=UNLOAD May 13 06:53:20.214000 audit: BPF prog-id=34 op=LOAD May 13 06:53:20.214000 audit: BPF prog-id=35 op=LOAD May 13 06:53:20.214000 audit: BPF prog-id=19 op=UNLOAD May 13 06:53:20.214000 audit: BPF prog-id=20 op=UNLOAD May 13 06:53:20.232115 systemd[1]: Finished systemd-tmpfiles-setup.service. May 13 06:53:20.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:20.235418 systemd[1]: Starting audit-rules.service... May 13 06:53:20.238248 systemd[1]: Starting clean-ca-certificates.service... May 13 06:53:20.241165 systemd[1]: Starting systemd-journal-catalog-update.service... May 13 06:53:20.244000 audit: BPF prog-id=36 op=LOAD May 13 06:53:20.248012 systemd[1]: Starting systemd-resolved.service... May 13 06:53:20.249000 audit: BPF prog-id=37 op=LOAD May 13 06:53:20.251433 systemd[1]: Starting systemd-timesyncd.service... May 13 06:53:20.255423 systemd[1]: Starting systemd-update-utmp.service... May 13 06:53:20.261240 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 06:53:20.263677 systemd[1]: Starting modprobe@dm_mod.service... May 13 06:53:20.266123 systemd[1]: Starting modprobe@efi_pstore.service... May 13 06:53:20.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:20.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:20.269824 systemd[1]: Starting modprobe@loop.service... May 13 06:53:20.271135 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 06:53:20.271290 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 06:53:20.274300 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 06:53:20.274454 systemd[1]: Finished modprobe@efi_pstore.service. May 13 06:53:20.276512 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 06:53:20.279534 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 06:53:20.281690 systemd[1]: Starting modprobe@efi_pstore.service... May 13 06:53:20.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:20.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:20.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:20.285000 audit[1104]: SYSTEM_BOOT pid=1104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 13 06:53:20.283310 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 06:53:20.283438 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 06:53:20.284291 systemd[1]: Finished clean-ca-certificates.service. May 13 06:53:20.285138 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 06:53:20.285255 systemd[1]: Finished modprobe@dm_mod.service. May 13 06:53:20.292563 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 06:53:20.295013 systemd[1]: Starting modprobe@dm_mod.service... May 13 06:53:20.297248 ldconfig[1006]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 13 06:53:20.296694 systemd[1]: Starting modprobe@drm.service... May 13 06:53:20.298085 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 06:53:20.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:20.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:20.298289 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 06:53:20.299740 systemd[1]: Starting systemd-networkd-wait-online.service... May 13 06:53:20.301632 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 06:53:20.303304 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 06:53:20.303431 systemd[1]: Finished modprobe@loop.service. May 13 06:53:20.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:20.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:20.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:20.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:20.305953 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 06:53:20.306075 systemd[1]: Finished modprobe@drm.service. May 13 06:53:20.309014 systemd[1]: Finished ensure-sysext.service. May 13 06:53:20.309745 systemd[1]: Finished systemd-update-utmp.service. May 13 06:53:20.312287 systemd[1]: Finished ldconfig.service. May 13 06:53:20.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:20.317224 systemd[1]: Finished systemd-journal-catalog-update.service. May 13 06:53:20.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:20.318054 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 06:53:20.318174 systemd[1]: Finished modprobe@efi_pstore.service. May 13 06:53:20.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:20.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:20.318882 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 06:53:20.319050 systemd[1]: Finished modprobe@dm_mod.service. May 13 06:53:20.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:20.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:20.319696 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 06:53:20.319746 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 06:53:20.321242 systemd[1]: Starting systemd-update-done.service... May 13 06:53:20.334436 systemd[1]: Finished systemd-update-done.service. May 13 06:53:20.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:20.353000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 13 06:53:20.353000 audit[1125]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffe90ebd90 a2=420 a3=0 items=0 ppid=1096 pid=1125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:20.353000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 13 06:53:20.354693 augenrules[1125]: No rules May 13 06:53:20.354681 systemd[1]: Finished audit-rules.service. May 13 06:53:20.370391 systemd-resolved[1100]: Positive Trust Anchors: May 13 06:53:20.370408 systemd-resolved[1100]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 06:53:20.370445 systemd-resolved[1100]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 06:53:20.377830 systemd-resolved[1100]: Using system hostname 'ci-3510-3-7-n-7f05b50207.novalocal'. May 13 06:53:20.379257 systemd[1]: Started systemd-resolved.service. May 13 06:53:20.379873 systemd[1]: Reached target network.target. May 13 06:53:20.380383 systemd[1]: Reached target nss-lookup.target. May 13 06:53:20.385773 systemd[1]: Started systemd-timesyncd.service. May 13 06:53:20.386341 systemd[1]: Reached target sysinit.target. May 13 06:53:20.386859 systemd[1]: Started motdgen.path. May 13 06:53:20.387388 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 13 06:53:20.387907 systemd[1]: Started systemd-tmpfiles-clean.timer. May 13 06:53:20.388382 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 13 06:53:20.388412 systemd[1]: Reached target paths.target. May 13 06:53:20.388842 systemd[1]: Reached target time-set.target. May 13 06:53:20.389439 systemd[1]: Started logrotate.timer. May 13 06:53:20.389973 systemd[1]: Started mdadm.timer. May 13 06:53:20.390584 systemd[1]: Reached target timers.target. May 13 06:53:20.391583 systemd[1]: Listening on dbus.socket. May 13 06:53:20.393472 systemd[1]: Starting docker.socket... May 13 06:53:20.398234 systemd[1]: Listening on sshd.socket. May 13 06:53:20.399499 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 06:53:20.401532 systemd[1]: Listening on docker.socket. May 13 06:53:20.402092 systemd[1]: Reached target sockets.target. May 13 06:53:20.402548 systemd[1]: Reached target basic.target. May 13 06:53:20.403037 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 06:53:20.403084 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 06:53:20.403109 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 06:53:20.404267 systemd[1]: Starting containerd.service... May 13 06:53:20.405782 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 13 06:53:20.409089 systemd[1]: Starting dbus.service... May 13 06:53:20.410832 systemd[1]: Starting enable-oem-cloudinit.service... May 13 06:53:20.412936 systemd[1]: Starting extend-filesystems.service... May 13 06:53:20.413840 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 13 06:53:20.415515 systemd[1]: Starting motdgen.service... May 13 06:53:20.418764 systemd[1]: Starting prepare-helm.service... May 13 06:53:20.421570 systemd[1]: Starting ssh-key-proc-cmdline.service... May 13 06:53:20.425183 systemd[1]: Starting sshd-keygen.service... May 13 06:53:20.431789 systemd[1]: Starting systemd-logind.service... May 13 06:53:20.432470 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 06:53:20.432535 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 13 06:53:20.433305 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 13 06:53:20.434810 systemd[1]: Starting update-engine.service... May 13 06:53:20.438052 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 13 06:53:20.438569 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 06:53:20.441950 jq[1146]: true May 13 06:53:20.452519 jq[1138]: false May 13 06:53:20.452797 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 13 06:53:20.452996 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 13 06:53:20.464122 tar[1149]: linux-amd64/LICENSE May 13 06:53:20.464955 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 13 06:53:20.465144 systemd[1]: Finished ssh-key-proc-cmdline.service. May 13 06:53:20.465376 tar[1149]: linux-amd64/helm May 13 06:53:20.470387 jq[1150]: true May 13 06:53:20.511706 extend-filesystems[1139]: Found loop1 May 13 06:53:20.512591 extend-filesystems[1139]: Found vda May 13 06:53:20.512591 extend-filesystems[1139]: Found vda1 May 13 06:53:20.512591 extend-filesystems[1139]: Found vda2 May 13 06:53:20.512591 extend-filesystems[1139]: Found vda3 May 13 06:53:20.512591 extend-filesystems[1139]: Found usr May 13 06:53:20.512591 extend-filesystems[1139]: Found vda4 May 13 06:53:20.512591 extend-filesystems[1139]: Found vda6 May 13 06:53:20.512591 extend-filesystems[1139]: Found vda7 May 13 06:53:20.512591 extend-filesystems[1139]: Found vda9 May 13 06:53:20.512591 extend-filesystems[1139]: Checking size of /dev/vda9 May 13 06:53:20.522808 dbus-daemon[1135]: [system] SELinux support is enabled May 13 06:53:20.521939 systemd[1]: motdgen.service: Deactivated successfully. May 13 06:53:20.522114 systemd[1]: Finished motdgen.service. May 13 06:53:20.522944 systemd[1]: Started dbus.service. May 13 06:53:20.525875 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 13 06:53:20.525906 systemd[1]: Reached target system-config.target. May 13 06:53:20.526747 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 13 06:53:20.526772 systemd[1]: Reached target user-config.target. May 13 06:53:20.552280 extend-filesystems[1139]: Resized partition /dev/vda9 May 13 06:53:20.563761 extend-filesystems[1188]: resize2fs 1.46.5 (30-Dec-2021) May 13 06:53:20.576612 env[1155]: time="2025-05-13T06:53:20.576557099Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 13 06:53:20.589745 bash[1184]: Updated "/home/core/.ssh/authorized_keys" May 13 06:53:20.590120 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 13 06:53:20.596942 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 2014203 blocks May 13 06:53:20.599944 kernel: EXT4-fs (vda9): resized filesystem to 2014203 May 13 06:53:20.607706 update_engine[1145]: I0513 06:53:20.606791 1145 main.cc:92] Flatcar Update Engine starting May 13 06:53:20.627765 update_engine[1145]: I0513 06:53:20.623549 1145 update_check_scheduler.cc:74] Next update check in 10m4s May 13 06:53:20.623491 systemd[1]: Started update-engine.service. May 13 06:53:20.625755 systemd[1]: Started locksmithd.service. May 13 06:53:20.627632 systemd-timesyncd[1101]: Contacted time server 23.131.160.7:123 (0.flatcar.pool.ntp.org). May 13 06:53:20.627686 systemd-timesyncd[1101]: Initial clock synchronization to Tue 2025-05-13 06:53:20.750405 UTC. May 13 06:53:20.628065 systemd-logind[1144]: Watching system buttons on /dev/input/event1 (Power Button) May 13 06:53:20.628083 systemd-logind[1144]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 13 06:53:20.628320 systemd-logind[1144]: New seat seat0. May 13 06:53:20.637343 extend-filesystems[1188]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 13 06:53:20.637343 extend-filesystems[1188]: old_desc_blocks = 1, new_desc_blocks = 1 May 13 06:53:20.637343 extend-filesystems[1188]: The filesystem on /dev/vda9 is now 2014203 (4k) blocks long. May 13 06:53:20.636559 systemd[1]: extend-filesystems.service: Deactivated successfully. May 13 06:53:20.643122 extend-filesystems[1139]: Resized filesystem in /dev/vda9 May 13 06:53:20.636719 systemd[1]: Finished extend-filesystems.service. May 13 06:53:20.640283 systemd[1]: Started systemd-logind.service. May 13 06:53:20.657304 env[1155]: time="2025-05-13T06:53:20.657266069Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 13 06:53:20.657523 env[1155]: time="2025-05-13T06:53:20.657504406Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 13 06:53:20.659235 env[1155]: time="2025-05-13T06:53:20.659192261Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 13 06:53:20.661956 env[1155]: time="2025-05-13T06:53:20.661935937Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 13 06:53:20.662223 env[1155]: time="2025-05-13T06:53:20.662200263Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 06:53:20.662304 env[1155]: time="2025-05-13T06:53:20.662288378Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 13 06:53:20.662369 env[1155]: time="2025-05-13T06:53:20.662353480Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 13 06:53:20.662426 env[1155]: time="2025-05-13T06:53:20.662412892Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 13 06:53:20.662560 env[1155]: time="2025-05-13T06:53:20.662543206Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 13 06:53:20.662871 env[1155]: time="2025-05-13T06:53:20.662852376Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 13 06:53:20.665081 env[1155]: time="2025-05-13T06:53:20.665058483Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 06:53:20.665159 env[1155]: time="2025-05-13T06:53:20.665144094Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 13 06:53:20.665268 env[1155]: time="2025-05-13T06:53:20.665250293Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 13 06:53:20.665332 env[1155]: time="2025-05-13T06:53:20.665318301Z" level=info msg="metadata content store policy set" policy=shared May 13 06:53:20.675614 env[1155]: time="2025-05-13T06:53:20.674518776Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 13 06:53:20.675614 env[1155]: time="2025-05-13T06:53:20.674545877Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 13 06:53:20.675614 env[1155]: time="2025-05-13T06:53:20.674562318Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 13 06:53:20.675614 env[1155]: time="2025-05-13T06:53:20.674626328Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 13 06:53:20.675614 env[1155]: time="2025-05-13T06:53:20.674648630Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 13 06:53:20.675614 env[1155]: time="2025-05-13T06:53:20.674683956Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 13 06:53:20.675614 env[1155]: time="2025-05-13T06:53:20.674700217Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 13 06:53:20.675614 env[1155]: time="2025-05-13T06:53:20.674715285Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 13 06:53:20.675614 env[1155]: time="2025-05-13T06:53:20.674729962Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 13 06:53:20.675614 env[1155]: time="2025-05-13T06:53:20.674744419Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 13 06:53:20.675614 env[1155]: time="2025-05-13T06:53:20.674777321Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 13 06:53:20.675614 env[1155]: time="2025-05-13T06:53:20.674790897Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 13 06:53:20.675614 env[1155]: time="2025-05-13T06:53:20.674897477Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 13 06:53:20.675614 env[1155]: time="2025-05-13T06:53:20.675037249Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 13 06:53:20.675991 env[1155]: time="2025-05-13T06:53:20.675366396Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 13 06:53:20.675991 env[1155]: time="2025-05-13T06:53:20.675393757Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 13 06:53:20.675991 env[1155]: time="2025-05-13T06:53:20.675407814Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 13 06:53:20.675991 env[1155]: time="2025-05-13T06:53:20.675466103Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 13 06:53:20.675991 env[1155]: time="2025-05-13T06:53:20.675483085Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 13 06:53:20.675991 env[1155]: time="2025-05-13T06:53:20.675497702Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 13 06:53:20.675991 env[1155]: time="2025-05-13T06:53:20.675528350Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 13 06:53:20.675991 env[1155]: time="2025-05-13T06:53:20.675544420Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 13 06:53:20.675991 env[1155]: time="2025-05-13T06:53:20.675558426Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 13 06:53:20.675991 env[1155]: time="2025-05-13T06:53:20.675571431Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 13 06:53:20.675991 env[1155]: time="2025-05-13T06:53:20.675583794Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 13 06:53:20.676600 env[1155]: time="2025-05-13T06:53:20.676268027Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 13 06:53:20.676600 env[1155]: time="2025-05-13T06:53:20.676461360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 13 06:53:20.676600 env[1155]: time="2025-05-13T06:53:20.676484533Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 13 06:53:20.676600 env[1155]: time="2025-05-13T06:53:20.676519228Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 13 06:53:20.676600 env[1155]: time="2025-05-13T06:53:20.676535669Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 13 06:53:20.676600 env[1155]: time="2025-05-13T06:53:20.676552290Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 13 06:53:20.676600 env[1155]: time="2025-05-13T06:53:20.676566447Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 13 06:53:20.676924 env[1155]: time="2025-05-13T06:53:20.676808571Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 13 06:53:20.676924 env[1155]: time="2025-05-13T06:53:20.676854226Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 13 06:53:20.677315 env[1155]: time="2025-05-13T06:53:20.677236303Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 13 06:53:20.681971 env[1155]: time="2025-05-13T06:53:20.677460363Z" level=info msg="Connect containerd service" May 13 06:53:20.681971 env[1155]: time="2025-05-13T06:53:20.677497313Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 13 06:53:20.681971 env[1155]: time="2025-05-13T06:53:20.678272577Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 06:53:20.681971 env[1155]: time="2025-05-13T06:53:20.678544246Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 13 06:53:20.681971 env[1155]: time="2025-05-13T06:53:20.678586716Z" level=info msg=serving... address=/run/containerd/containerd.sock May 13 06:53:20.681971 env[1155]: time="2025-05-13T06:53:20.678641318Z" level=info msg="containerd successfully booted in 0.103195s" May 13 06:53:20.681971 env[1155]: time="2025-05-13T06:53:20.680796420Z" level=info msg="Start subscribing containerd event" May 13 06:53:20.681971 env[1155]: time="2025-05-13T06:53:20.681187914Z" level=info msg="Start recovering state" May 13 06:53:20.681971 env[1155]: time="2025-05-13T06:53:20.681402998Z" level=info msg="Start event monitor" May 13 06:53:20.678724 systemd[1]: Started containerd.service. May 13 06:53:20.682292 env[1155]: time="2025-05-13T06:53:20.682273681Z" level=info msg="Start snapshots syncer" May 13 06:53:20.682375 env[1155]: time="2025-05-13T06:53:20.682360443Z" level=info msg="Start cni network conf syncer for default" May 13 06:53:20.682458 env[1155]: time="2025-05-13T06:53:20.682444391Z" level=info msg="Start streaming server" May 13 06:53:20.952174 systemd-networkd[971]: eth0: Gained IPv6LL May 13 06:53:20.954205 systemd[1]: Finished systemd-networkd-wait-online.service. May 13 06:53:20.955102 systemd[1]: Reached target network-online.target. May 13 06:53:20.957502 systemd[1]: Starting kubelet.service... May 13 06:53:21.103322 tar[1149]: linux-amd64/README.md May 13 06:53:21.109338 systemd[1]: Finished prepare-helm.service. May 13 06:53:21.322562 locksmithd[1192]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 13 06:53:21.737423 sshd_keygen[1161]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 13 06:53:21.766983 systemd[1]: Finished sshd-keygen.service. May 13 06:53:21.769070 systemd[1]: Starting issuegen.service... May 13 06:53:21.775422 systemd[1]: issuegen.service: Deactivated successfully. May 13 06:53:21.775570 systemd[1]: Finished issuegen.service. May 13 06:53:21.777448 systemd[1]: Starting systemd-user-sessions.service... May 13 06:53:21.784966 systemd[1]: Finished systemd-user-sessions.service. May 13 06:53:21.786894 systemd[1]: Started getty@tty1.service. May 13 06:53:21.788596 systemd[1]: Started serial-getty@ttyS0.service. May 13 06:53:21.789309 systemd[1]: Reached target getty.target. May 13 06:53:22.643734 systemd[1]: Started kubelet.service. May 13 06:53:23.875845 kubelet[1219]: E0513 06:53:23.875764 1219 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 06:53:23.879715 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 06:53:23.880053 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 06:53:23.880615 systemd[1]: kubelet.service: Consumed 1.832s CPU time. May 13 06:53:27.570543 coreos-metadata[1134]: May 13 06:53:27.570 WARN failed to locate config-drive, using the metadata service API instead May 13 06:53:27.660359 coreos-metadata[1134]: May 13 06:53:27.660 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 May 13 06:53:28.002674 coreos-metadata[1134]: May 13 06:53:28.002 INFO Fetch successful May 13 06:53:28.002674 coreos-metadata[1134]: May 13 06:53:28.002 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 May 13 06:53:28.018073 coreos-metadata[1134]: May 13 06:53:28.017 INFO Fetch successful May 13 06:53:28.024043 unknown[1134]: wrote ssh authorized keys file for user: core May 13 06:53:28.050662 update-ssh-keys[1228]: Updated "/home/core/.ssh/authorized_keys" May 13 06:53:28.052181 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 13 06:53:28.053053 systemd[1]: Reached target multi-user.target. May 13 06:53:28.055860 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 13 06:53:28.073511 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 13 06:53:28.073900 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 13 06:53:28.077102 systemd[1]: Startup finished in 965ms (kernel) + 7.561s (initrd) + 13.873s (userspace) = 22.401s. May 13 06:53:30.275504 systemd[1]: Created slice system-sshd.slice. May 13 06:53:30.278072 systemd[1]: Started sshd@0-172.24.4.54:22-172.24.4.1:59682.service. May 13 06:53:31.799149 sshd[1231]: Accepted publickey for core from 172.24.4.1 port 59682 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:53:31.804071 sshd[1231]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:53:31.830141 systemd[1]: Created slice user-500.slice. May 13 06:53:31.832841 systemd[1]: Starting user-runtime-dir@500.service... May 13 06:53:31.842419 systemd-logind[1144]: New session 1 of user core. May 13 06:53:31.855397 systemd[1]: Finished user-runtime-dir@500.service. May 13 06:53:31.859173 systemd[1]: Starting user@500.service... May 13 06:53:31.867524 (systemd)[1234]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 13 06:53:31.989938 systemd[1234]: Queued start job for default target default.target. May 13 06:53:31.990442 systemd[1234]: Reached target paths.target. May 13 06:53:31.990462 systemd[1234]: Reached target sockets.target. May 13 06:53:31.990489 systemd[1234]: Reached target timers.target. May 13 06:53:31.990516 systemd[1234]: Reached target basic.target. May 13 06:53:31.990557 systemd[1234]: Reached target default.target. May 13 06:53:31.990581 systemd[1234]: Startup finished in 109ms. May 13 06:53:31.992200 systemd[1]: Started user@500.service. May 13 06:53:31.994588 systemd[1]: Started session-1.scope. May 13 06:53:32.596902 systemd[1]: Started sshd@1-172.24.4.54:22-172.24.4.1:59686.service. May 13 06:53:33.858310 sshd[1243]: Accepted publickey for core from 172.24.4.1 port 59686 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:53:33.861358 sshd[1243]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:53:33.872508 systemd-logind[1144]: New session 2 of user core. May 13 06:53:33.873401 systemd[1]: Started session-2.scope. May 13 06:53:33.881984 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 13 06:53:33.882448 systemd[1]: Stopped kubelet.service. May 13 06:53:33.882537 systemd[1]: kubelet.service: Consumed 1.832s CPU time. May 13 06:53:33.885120 systemd[1]: Starting kubelet.service... May 13 06:53:34.186008 systemd[1]: Started kubelet.service. May 13 06:53:34.276073 kubelet[1250]: E0513 06:53:34.275870 1250 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 06:53:34.282404 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 06:53:34.282711 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 06:53:34.550082 sshd[1243]: pam_unix(sshd:session): session closed for user core May 13 06:53:34.556562 systemd[1]: Started sshd@2-172.24.4.54:22-172.24.4.1:48600.service. May 13 06:53:34.557792 systemd[1]: sshd@1-172.24.4.54:22-172.24.4.1:59686.service: Deactivated successfully. May 13 06:53:34.561229 systemd[1]: session-2.scope: Deactivated successfully. May 13 06:53:34.563676 systemd-logind[1144]: Session 2 logged out. Waiting for processes to exit. May 13 06:53:34.567221 systemd-logind[1144]: Removed session 2. May 13 06:53:35.920331 sshd[1258]: Accepted publickey for core from 172.24.4.1 port 48600 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:53:35.923240 sshd[1258]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:53:35.934435 systemd[1]: Started session-3.scope. May 13 06:53:35.938369 systemd-logind[1144]: New session 3 of user core. May 13 06:53:36.695762 sshd[1258]: pam_unix(sshd:session): session closed for user core May 13 06:53:36.703730 systemd[1]: Started sshd@3-172.24.4.54:22-172.24.4.1:48602.service. May 13 06:53:36.707632 systemd[1]: sshd@2-172.24.4.54:22-172.24.4.1:48600.service: Deactivated successfully. May 13 06:53:36.709380 systemd[1]: session-3.scope: Deactivated successfully. May 13 06:53:36.711384 systemd-logind[1144]: Session 3 logged out. Waiting for processes to exit. May 13 06:53:36.713671 systemd-logind[1144]: Removed session 3. May 13 06:53:38.188630 sshd[1264]: Accepted publickey for core from 172.24.4.1 port 48602 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:53:38.191392 sshd[1264]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:53:38.201647 systemd-logind[1144]: New session 4 of user core. May 13 06:53:38.202276 systemd[1]: Started session-4.scope. May 13 06:53:38.966297 sshd[1264]: pam_unix(sshd:session): session closed for user core May 13 06:53:38.974398 systemd[1]: Started sshd@4-172.24.4.54:22-172.24.4.1:48606.service. May 13 06:53:38.975701 systemd[1]: sshd@3-172.24.4.54:22-172.24.4.1:48602.service: Deactivated successfully. May 13 06:53:38.977293 systemd[1]: session-4.scope: Deactivated successfully. May 13 06:53:38.981206 systemd-logind[1144]: Session 4 logged out. Waiting for processes to exit. May 13 06:53:38.984066 systemd-logind[1144]: Removed session 4. May 13 06:53:40.466497 sshd[1270]: Accepted publickey for core from 172.24.4.1 port 48606 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:53:40.469965 sshd[1270]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:53:40.480030 systemd-logind[1144]: New session 5 of user core. May 13 06:53:40.480806 systemd[1]: Started session-5.scope. May 13 06:53:41.241220 sudo[1274]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 13 06:53:41.241746 sudo[1274]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 06:53:41.255201 dbus-daemon[1135]: \xd0\xed\xbf\KV: received setenforce notice (enforcing=-1495303616) May 13 06:53:41.257245 sudo[1274]: pam_unix(sudo:session): session closed for user root May 13 06:53:41.488436 sshd[1270]: pam_unix(sshd:session): session closed for user core May 13 06:53:41.494821 systemd[1]: Started sshd@5-172.24.4.54:22-172.24.4.1:48612.service. May 13 06:53:41.501420 systemd[1]: sshd@4-172.24.4.54:22-172.24.4.1:48606.service: Deactivated successfully. May 13 06:53:41.502900 systemd[1]: session-5.scope: Deactivated successfully. May 13 06:53:41.505882 systemd-logind[1144]: Session 5 logged out. Waiting for processes to exit. May 13 06:53:41.508858 systemd-logind[1144]: Removed session 5. May 13 06:53:42.711078 sshd[1277]: Accepted publickey for core from 172.24.4.1 port 48612 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:53:42.713974 sshd[1277]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:53:42.724469 systemd-logind[1144]: New session 6 of user core. May 13 06:53:42.725183 systemd[1]: Started session-6.scope. May 13 06:53:43.025855 sudo[1282]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 13 06:53:43.027221 sudo[1282]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 06:53:43.034106 sudo[1282]: pam_unix(sudo:session): session closed for user root May 13 06:53:43.045175 sudo[1281]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 13 06:53:43.046306 sudo[1281]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 06:53:43.068559 systemd[1]: Stopping audit-rules.service... May 13 06:53:43.069000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 06:53:43.074705 kernel: kauditd_printk_skb: 173 callbacks suppressed May 13 06:53:43.074827 kernel: audit: type=1305 audit(1747119223.069:208): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 06:53:43.069000 audit[1285]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcf90f84f0 a2=420 a3=0 items=0 ppid=1 pid=1285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:43.097591 kernel: audit: type=1300 audit(1747119223.069:208): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcf90f84f0 a2=420 a3=0 items=0 ppid=1 pid=1285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:43.097745 auditctl[1285]: No rules May 13 06:53:43.069000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 13 06:53:43.098838 systemd[1]: audit-rules.service: Deactivated successfully. May 13 06:53:43.102709 kernel: audit: type=1327 audit(1747119223.069:208): proctitle=2F7362696E2F617564697463746C002D44 May 13 06:53:43.102790 kernel: audit: type=1131 audit(1747119223.097:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:43.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:43.099234 systemd[1]: Stopped audit-rules.service. May 13 06:53:43.107326 systemd[1]: Starting audit-rules.service... May 13 06:53:43.136902 augenrules[1302]: No rules May 13 06:53:43.138624 systemd[1]: Finished audit-rules.service. May 13 06:53:43.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:43.140995 sudo[1281]: pam_unix(sudo:session): session closed for user root May 13 06:53:43.138000 audit[1281]: USER_END pid=1281 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 06:53:43.150101 kernel: audit: type=1130 audit(1747119223.138:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:43.150209 kernel: audit: type=1106 audit(1747119223.138:211): pid=1281 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 06:53:43.150268 kernel: audit: type=1104 audit(1747119223.138:212): pid=1281 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 06:53:43.138000 audit[1281]: CRED_DISP pid=1281 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 06:53:43.327116 sshd[1277]: pam_unix(sshd:session): session closed for user core May 13 06:53:43.352020 kernel: audit: type=1106 audit(1747119223.333:213): pid=1277 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:53:43.333000 audit[1277]: USER_END pid=1277 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:53:43.337748 systemd[1]: Started sshd@6-172.24.4.54:22-172.24.4.1:48618.service. May 13 06:53:43.339083 systemd[1]: sshd@5-172.24.4.54:22-172.24.4.1:48612.service: Deactivated successfully. May 13 06:53:43.340649 systemd[1]: session-6.scope: Deactivated successfully. May 13 06:53:43.368433 kernel: audit: type=1104 audit(1747119223.334:214): pid=1277 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:53:43.334000 audit[1277]: CRED_DISP pid=1277 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:53:43.367301 systemd-logind[1144]: Session 6 logged out. Waiting for processes to exit. May 13 06:53:43.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.54:22-172.24.4.1:48618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:43.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.24.4.54:22-172.24.4.1:48612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:43.382983 kernel: audit: type=1130 audit(1747119223.337:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.54:22-172.24.4.1:48618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:43.383135 systemd-logind[1144]: Removed session 6. May 13 06:53:44.290000 audit[1307]: USER_ACCT pid=1307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:53:44.291741 sshd[1307]: Accepted publickey for core from 172.24.4.1 port 48618 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:53:44.292000 audit[1307]: CRED_ACQ pid=1307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:53:44.292000 audit[1307]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8812ff30 a2=3 a3=0 items=0 ppid=1 pid=1307 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:44.292000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 06:53:44.295067 sshd[1307]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:53:44.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:44.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:44.297331 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 13 06:53:44.297902 systemd[1]: Stopped kubelet.service. May 13 06:53:44.300816 systemd[1]: Starting kubelet.service... May 13 06:53:44.313417 systemd-logind[1144]: New session 7 of user core. May 13 06:53:44.315452 systemd[1]: Started session-7.scope. May 13 06:53:44.328000 audit[1307]: USER_START pid=1307 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:53:44.331000 audit[1312]: CRED_ACQ pid=1312 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:53:44.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:44.578789 systemd[1]: Started kubelet.service. May 13 06:53:44.597000 audit[1320]: USER_ACCT pid=1320 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 06:53:44.597000 audit[1320]: CRED_REFR pid=1320 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 06:53:44.598126 sudo[1320]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 13 06:53:44.598363 sudo[1320]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 06:53:44.599000 audit[1320]: USER_START pid=1320 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 06:53:44.658262 systemd[1]: Starting docker.service... May 13 06:53:44.665556 kubelet[1315]: E0513 06:53:44.665522 1315 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 06:53:44.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 06:53:44.672528 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 06:53:44.672662 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 06:53:44.701987 env[1330]: time="2025-05-13T06:53:44.701904815Z" level=info msg="Starting up" May 13 06:53:44.703480 env[1330]: time="2025-05-13T06:53:44.703448994Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 13 06:53:44.703549 env[1330]: time="2025-05-13T06:53:44.703534147Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 13 06:53:44.703642 env[1330]: time="2025-05-13T06:53:44.703624164Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 13 06:53:44.703706 env[1330]: time="2025-05-13T06:53:44.703693135Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 13 06:53:44.705687 env[1330]: time="2025-05-13T06:53:44.705666662Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 13 06:53:44.705765 env[1330]: time="2025-05-13T06:53:44.705751243Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 13 06:53:44.705841 env[1330]: time="2025-05-13T06:53:44.705823784Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 13 06:53:44.705900 env[1330]: time="2025-05-13T06:53:44.705887341Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 13 06:53:44.711563 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3569679493-merged.mount: Deactivated successfully. May 13 06:53:44.763381 env[1330]: time="2025-05-13T06:53:44.763308603Z" level=info msg="Loading containers: start." May 13 06:53:44.863000 audit[1361]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1361 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:53:44.863000 audit[1361]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fffb391ca00 a2=0 a3=7fffb391c9ec items=0 ppid=1330 pid=1361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:44.863000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 13 06:53:44.865000 audit[1363]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1363 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:53:44.865000 audit[1363]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd79fcdbc0 a2=0 a3=7ffd79fcdbac items=0 ppid=1330 pid=1363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:44.865000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 13 06:53:44.868000 audit[1365]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1365 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:53:44.868000 audit[1365]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcdaf255a0 a2=0 a3=7ffcdaf2558c items=0 ppid=1330 pid=1365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:44.868000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 06:53:44.872000 audit[1367]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1367 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:53:44.872000 audit[1367]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffca9037ff0 a2=0 a3=7ffca9037fdc items=0 ppid=1330 pid=1367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:44.872000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 13 06:53:44.876000 audit[1369]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1369 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:53:44.876000 audit[1369]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd688ffda0 a2=0 a3=7ffd688ffd8c items=0 ppid=1330 pid=1369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:44.876000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 13 06:53:44.894000 audit[1374]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1374 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:53:44.894000 audit[1374]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdfad76be0 a2=0 a3=7ffdfad76bcc items=0 ppid=1330 pid=1374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:44.894000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 13 06:53:44.911000 audit[1376]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1376 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:53:44.911000 audit[1376]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc78d81d00 a2=0 a3=7ffc78d81cec items=0 ppid=1330 pid=1376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:44.911000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 13 06:53:44.916000 audit[1378]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1378 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:53:44.916000 audit[1378]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd3238d970 a2=0 a3=7ffd3238d95c items=0 ppid=1330 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:44.916000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 13 06:53:44.921000 audit[1380]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1380 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:53:44.921000 audit[1380]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe59ea17f0 a2=0 a3=7ffe59ea17dc items=0 ppid=1330 pid=1380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:44.921000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 06:53:44.939000 audit[1384]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1384 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:53:44.939000 audit[1384]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe9d22fe70 a2=0 a3=7ffe9d22fe5c items=0 ppid=1330 pid=1384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:44.939000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 13 06:53:44.944000 audit[1385]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1385 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:53:44.944000 audit[1385]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff70b01510 a2=0 a3=7fff70b014fc items=0 ppid=1330 pid=1385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:44.944000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 06:53:44.973970 kernel: Initializing XFRM netlink socket May 13 06:53:45.031137 env[1330]: time="2025-05-13T06:53:45.031061803Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 13 06:53:45.071000 audit[1393]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:53:45.071000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff41e78840 a2=0 a3=7fff41e7882c items=0 ppid=1330 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:45.071000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 13 06:53:45.082000 audit[1396]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1396 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:53:45.082000 audit[1396]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc94f29100 a2=0 a3=7ffc94f290ec items=0 ppid=1330 pid=1396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:45.082000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 13 06:53:45.091000 audit[1399]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:53:45.091000 audit[1399]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd430b86d0 a2=0 a3=7ffd430b86bc items=0 ppid=1330 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:45.091000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 13 06:53:45.095000 audit[1401]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:53:45.095000 audit[1401]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffd8533210 a2=0 a3=7fffd85331fc items=0 ppid=1330 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:45.095000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 13 06:53:45.099000 audit[1403]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:53:45.099000 audit[1403]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffdd134f270 a2=0 a3=7ffdd134f25c items=0 ppid=1330 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:45.099000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 13 06:53:45.104000 audit[1405]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:53:45.104000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd374460f0 a2=0 a3=7ffd374460dc items=0 ppid=1330 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:45.104000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 13 06:53:45.108000 audit[1407]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:53:45.108000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff9993acd0 a2=0 a3=7fff9993acbc items=0 ppid=1330 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:45.108000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 13 06:53:45.124000 audit[1410]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:53:45.124000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc904b2a10 a2=0 a3=7ffc904b29fc items=0 ppid=1330 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:45.124000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 13 06:53:45.129000 audit[1412]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:53:45.129000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fffa8347970 a2=0 a3=7fffa834795c items=0 ppid=1330 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:45.129000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 06:53:45.133000 audit[1414]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:53:45.133000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe78db3960 a2=0 a3=7ffe78db394c items=0 ppid=1330 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:45.133000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 13 06:53:45.136000 audit[1416]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:53:45.136000 audit[1416]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe053ca6f0 a2=0 a3=7ffe053ca6dc items=0 ppid=1330 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:45.136000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 13 06:53:45.138183 systemd-networkd[971]: docker0: Link UP May 13 06:53:45.150000 audit[1420]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:53:45.150000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff39f5a510 a2=0 a3=7fff39f5a4fc items=0 ppid=1330 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:45.150000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 13 06:53:45.154000 audit[1421]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:53:45.154000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdcbe5d270 a2=0 a3=7ffdcbe5d25c items=0 ppid=1330 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:53:45.154000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 06:53:45.156344 env[1330]: time="2025-05-13T06:53:45.156301387Z" level=info msg="Loading containers: done." May 13 06:53:45.167628 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck633746458-merged.mount: Deactivated successfully. May 13 06:53:45.185372 env[1330]: time="2025-05-13T06:53:45.185311217Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 13 06:53:45.186061 env[1330]: time="2025-05-13T06:53:45.185999612Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 13 06:53:45.186492 env[1330]: time="2025-05-13T06:53:45.186441612Z" level=info msg="Daemon has completed initialization" May 13 06:53:45.221776 systemd[1]: Started docker.service. May 13 06:53:45.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:45.241939 env[1330]: time="2025-05-13T06:53:45.241465000Z" level=info msg="API listen on /run/docker.sock" May 13 06:53:47.249787 env[1155]: time="2025-05-13T06:53:47.249668415Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\"" May 13 06:53:47.990312 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2216976657.mount: Deactivated successfully. May 13 06:53:50.394533 env[1155]: time="2025-05-13T06:53:50.394421171Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:53:50.398600 env[1155]: time="2025-05-13T06:53:50.398543735Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1c20c8797e48698afa3380793df2f1fb260e3209df72d8e864e1bc73af8336e5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:53:50.402260 env[1155]: time="2025-05-13T06:53:50.402205630Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:53:50.405464 env[1155]: time="2025-05-13T06:53:50.405398146Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:631c6cc78b2862be4fed7df3384a643ef7297eebadae22e8ef9cbe2e19b6386f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:53:50.407994 env[1155]: time="2025-05-13T06:53:50.407893059Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\" returns image reference \"sha256:1c20c8797e48698afa3380793df2f1fb260e3209df72d8e864e1bc73af8336e5\"" May 13 06:53:50.409469 env[1155]: time="2025-05-13T06:53:50.409429199Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\"" May 13 06:53:52.750221 env[1155]: time="2025-05-13T06:53:52.750113136Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:53:52.753700 env[1155]: time="2025-05-13T06:53:52.753643660Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4db5364cd5509e0fc8e9f821fbc4b31ed79d4c9ae21809d22030ad67d530a61a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:53:52.757868 env[1155]: time="2025-05-13T06:53:52.757814250Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:53:52.765788 env[1155]: time="2025-05-13T06:53:52.765727890Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:25e29187ea66f0ff9b9a00114849c3a30b649005c900a8b2a69e3f3fa56448fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:53:52.766279 env[1155]: time="2025-05-13T06:53:52.766212414Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\" returns image reference \"sha256:4db5364cd5509e0fc8e9f821fbc4b31ed79d4c9ae21809d22030ad67d530a61a\"" May 13 06:53:52.768749 env[1155]: time="2025-05-13T06:53:52.768702608Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\"" May 13 06:53:54.722424 env[1155]: time="2025-05-13T06:53:54.722334202Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:53:54.726016 env[1155]: time="2025-05-13T06:53:54.725957477Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70a252485ed1f2e8332b6f0a5f8f57443bfbc3c480228f8dcd82ad5ab5cc4000,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:53:54.729204 env[1155]: time="2025-05-13T06:53:54.729138960Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:53:54.736847 env[1155]: time="2025-05-13T06:53:54.736754561Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\" returns image reference \"sha256:70a252485ed1f2e8332b6f0a5f8f57443bfbc3c480228f8dcd82ad5ab5cc4000\"" May 13 06:53:54.737359 env[1155]: time="2025-05-13T06:53:54.737310552Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09c55f8dac59a4b8e5e354140f5a4bdd6fa9bd95c42d6bcba6782ed37c31b5a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:53:54.740992 env[1155]: time="2025-05-13T06:53:54.740888247Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\"" May 13 06:53:54.873143 kernel: kauditd_printk_skb: 88 callbacks suppressed May 13 06:53:54.873348 kernel: audit: type=1130 audit(1747119234.868:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:54.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:54.868555 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 13 06:53:54.869095 systemd[1]: Stopped kubelet.service. May 13 06:53:54.872191 systemd[1]: Starting kubelet.service... May 13 06:53:54.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:54.897121 kernel: audit: type=1131 audit(1747119234.868:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:55.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:55.040108 systemd[1]: Started kubelet.service. May 13 06:53:55.051964 kernel: audit: type=1130 audit(1747119235.039:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:53:55.320176 kubelet[1458]: E0513 06:53:55.319976 1458 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 06:53:55.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 06:53:55.322093 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 06:53:55.322222 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 06:53:55.335017 kernel: audit: type=1131 audit(1747119235.321:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 06:53:56.643683 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4149664067.mount: Deactivated successfully. May 13 06:53:57.898158 env[1155]: time="2025-05-13T06:53:57.898046535Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:53:57.904071 env[1155]: time="2025-05-13T06:53:57.903966380Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:53:57.909551 env[1155]: time="2025-05-13T06:53:57.909460780Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:53:57.916097 env[1155]: time="2025-05-13T06:53:57.915987125Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:152638222ecf265eb8e5352e3c50e8fc520994e8ffcff1ee1490c975f7fc2b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:53:57.920567 env[1155]: time="2025-05-13T06:53:57.918762963Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\" returns image reference \"sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3\"" May 13 06:53:57.921791 env[1155]: time="2025-05-13T06:53:57.921699859Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 13 06:53:58.567617 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4114550563.mount: Deactivated successfully. May 13 06:54:00.213204 env[1155]: time="2025-05-13T06:54:00.213130066Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:00.218525 env[1155]: time="2025-05-13T06:54:00.218501378Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:00.223452 env[1155]: time="2025-05-13T06:54:00.223379320Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:00.226645 env[1155]: time="2025-05-13T06:54:00.226620858Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:00.228852 env[1155]: time="2025-05-13T06:54:00.228774137Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" May 13 06:54:00.237050 env[1155]: time="2025-05-13T06:54:00.236982261Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 13 06:54:00.828131 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2955709178.mount: Deactivated successfully. May 13 06:54:00.844632 env[1155]: time="2025-05-13T06:54:00.844427645Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:00.847903 env[1155]: time="2025-05-13T06:54:00.847818596Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:00.851325 env[1155]: time="2025-05-13T06:54:00.851216862Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:00.856609 env[1155]: time="2025-05-13T06:54:00.856551762Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:00.857898 env[1155]: time="2025-05-13T06:54:00.857770315Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 13 06:54:00.859057 env[1155]: time="2025-05-13T06:54:00.859006493Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" May 13 06:54:01.495086 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1929635097.mount: Deactivated successfully. May 13 06:54:05.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:54:05.368767 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 13 06:54:05.369436 systemd[1]: Stopped kubelet.service. May 13 06:54:05.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:54:05.389883 systemd[1]: Starting kubelet.service... May 13 06:54:05.399562 kernel: audit: type=1130 audit(1747119245.368:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:54:05.399700 kernel: audit: type=1131 audit(1747119245.368:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:54:05.689031 update_engine[1145]: I0513 06:54:05.688620 1145 update_attempter.cc:509] Updating boot flags... May 13 06:54:05.990346 systemd[1]: Started kubelet.service. May 13 06:54:06.003645 kernel: audit: type=1130 audit(1747119245.989:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:54:05.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:54:06.204469 kubelet[1472]: E0513 06:54:06.204420 1472 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 06:54:06.205704 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 06:54:06.205833 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 06:54:06.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 06:54:06.211933 kernel: audit: type=1131 audit(1747119246.205:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 06:54:06.465053 env[1155]: time="2025-05-13T06:54:06.464967304Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:06.469206 env[1155]: time="2025-05-13T06:54:06.469171251Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:06.473748 env[1155]: time="2025-05-13T06:54:06.473709556Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:06.480396 env[1155]: time="2025-05-13T06:54:06.480342105Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc\"" May 13 06:54:06.480696 env[1155]: time="2025-05-13T06:54:06.478223294Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:10.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:54:10.152312 systemd[1]: Stopped kubelet.service. May 13 06:54:10.166142 kernel: audit: type=1130 audit(1747119250.151:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:54:10.154412 systemd[1]: Starting kubelet.service... May 13 06:54:10.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:54:10.184038 kernel: audit: type=1131 audit(1747119250.151:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:54:10.209212 systemd[1]: Reloading. May 13 06:54:10.309736 /usr/lib/systemd/system-generators/torcx-generator[1533]: time="2025-05-13T06:54:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 06:54:10.310154 /usr/lib/systemd/system-generators/torcx-generator[1533]: time="2025-05-13T06:54:10Z" level=info msg="torcx already run" May 13 06:54:10.395840 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 06:54:10.395861 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 06:54:10.418548 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 06:54:10.503558 kernel: audit: type=1400 audit(1747119250.491:264): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.521899 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 13 06:54:10.522034 kernel: audit: type=1400 audit(1747119250.491:265): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.522091 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 13 06:54:10.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.535973 kernel: audit: type=1400 audit(1747119250.491:266): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.536074 kernel: audit: backlog limit exceeded May 13 06:54:10.536126 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 13 06:54:10.536171 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 May 13 06:54:10.536250 kernel: audit: backlog limit exceeded May 13 06:54:10.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.553514 kernel: audit: type=1400 audit(1747119250.491:267): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.501000 audit: BPF prog-id=43 op=LOAD May 13 06:54:10.501000 audit: BPF prog-id=27 op=UNLOAD May 13 06:54:10.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit: BPF prog-id=44 op=LOAD May 13 06:54:10.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit: BPF prog-id=45 op=LOAD May 13 06:54:10.502000 audit: BPF prog-id=28 op=UNLOAD May 13 06:54:10.502000 audit: BPF prog-id=29 op=UNLOAD May 13 06:54:10.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.502000 audit: BPF prog-id=46 op=LOAD May 13 06:54:10.502000 audit: BPF prog-id=30 op=UNLOAD May 13 06:54:10.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.507000 audit: BPF prog-id=47 op=LOAD May 13 06:54:10.507000 audit: BPF prog-id=36 op=UNLOAD May 13 06:54:10.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.554000 audit: BPF prog-id=52 op=LOAD May 13 06:54:10.554000 audit: BPF prog-id=38 op=UNLOAD May 13 06:54:10.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.554000 audit: BPF prog-id=54 op=LOAD May 13 06:54:10.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.554000 audit: BPF prog-id=55 op=LOAD May 13 06:54:10.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:10.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:54:10.565395 systemd[1]: Started kubelet.service. May 13 06:54:10.573174 systemd[1]: Stopping kubelet.service... May 13 06:54:10.574277 systemd[1]: kubelet.service: Deactivated successfully. May 13 06:54:10.574451 systemd[1]: Stopped kubelet.service. May 13 06:54:10.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:54:10.576133 systemd[1]: Starting kubelet.service... May 13 06:54:10.666414 systemd[1]: Started kubelet.service. May 13 06:54:10.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:54:10.724864 kubelet[1592]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 06:54:10.724864 kubelet[1592]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 13 06:54:10.724864 kubelet[1592]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 06:54:10.725313 kubelet[1592]: I0513 06:54:10.725054 1592 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 06:54:11.229733 kubelet[1592]: I0513 06:54:11.229673 1592 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 13 06:54:11.229733 kubelet[1592]: I0513 06:54:11.229709 1592 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 06:54:11.230115 kubelet[1592]: I0513 06:54:11.229997 1592 server.go:954] "Client rotation is on, will bootstrap in background" May 13 06:54:11.269326 kubelet[1592]: E0513 06:54:11.269261 1592 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://172.24.4.54:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 172.24.4.54:6443: connect: connection refused" logger="UnhandledError" May 13 06:54:11.270660 kubelet[1592]: I0513 06:54:11.270621 1592 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 06:54:11.287737 kubelet[1592]: E0513 06:54:11.287668 1592 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 13 06:54:11.288079 kubelet[1592]: I0513 06:54:11.288046 1592 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 13 06:54:11.294906 kubelet[1592]: I0513 06:54:11.294870 1592 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 06:54:11.298864 kubelet[1592]: I0513 06:54:11.298794 1592 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 06:54:11.299455 kubelet[1592]: I0513 06:54:11.299076 1592 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-7-n-7f05b50207.novalocal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 13 06:54:11.299759 kubelet[1592]: I0513 06:54:11.299732 1592 topology_manager.go:138] "Creating topology manager with none policy" May 13 06:54:11.299910 kubelet[1592]: I0513 06:54:11.299890 1592 container_manager_linux.go:304] "Creating device plugin manager" May 13 06:54:11.300344 kubelet[1592]: I0513 06:54:11.300316 1592 state_mem.go:36] "Initialized new in-memory state store" May 13 06:54:11.308728 kubelet[1592]: I0513 06:54:11.308697 1592 kubelet.go:446] "Attempting to sync node with API server" May 13 06:54:11.308978 kubelet[1592]: I0513 06:54:11.308949 1592 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 06:54:11.309165 kubelet[1592]: I0513 06:54:11.309142 1592 kubelet.go:352] "Adding apiserver pod source" May 13 06:54:11.309344 kubelet[1592]: I0513 06:54:11.309321 1592 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 06:54:11.315862 kubelet[1592]: W0513 06:54:11.315746 1592 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.24.4.54:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-n-7f05b50207.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.54:6443: connect: connection refused May 13 06:54:11.315862 kubelet[1592]: E0513 06:54:11.315840 1592 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.24.4.54:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-n-7f05b50207.novalocal&limit=500&resourceVersion=0\": dial tcp 172.24.4.54:6443: connect: connection refused" logger="UnhandledError" May 13 06:54:11.336898 kubelet[1592]: W0513 06:54:11.336816 1592 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.24.4.54:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.24.4.54:6443: connect: connection refused May 13 06:54:11.336898 kubelet[1592]: E0513 06:54:11.336868 1592 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.24.4.54:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.24.4.54:6443: connect: connection refused" logger="UnhandledError" May 13 06:54:11.340297 kubelet[1592]: I0513 06:54:11.340258 1592 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 06:54:11.341397 kubelet[1592]: I0513 06:54:11.341363 1592 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 06:54:11.347799 kubelet[1592]: W0513 06:54:11.347765 1592 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 13 06:54:11.357355 kubelet[1592]: I0513 06:54:11.357321 1592 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 13 06:54:11.357575 kubelet[1592]: I0513 06:54:11.357551 1592 server.go:1287] "Started kubelet" May 13 06:54:11.358490 kubelet[1592]: I0513 06:54:11.358429 1592 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 13 06:54:11.369682 kubelet[1592]: I0513 06:54:11.369585 1592 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 06:54:11.370496 kubelet[1592]: I0513 06:54:11.370462 1592 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 06:54:11.370752 kubelet[1592]: I0513 06:54:11.370546 1592 server.go:490] "Adding debug handlers to kubelet server" May 13 06:54:11.371000 audit[1592]: AVC avc: denied { mac_admin } for pid=1592 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:11.371000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 06:54:11.371000 audit[1592]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c4e600 a1=c00087d608 a2=c000c4e5d0 a3=25 items=0 ppid=1 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:11.371000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 06:54:11.371000 audit[1592]: AVC avc: denied { mac_admin } for pid=1592 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:11.371000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 06:54:11.371000 audit[1592]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009d2680 a1=c00087d620 a2=c000c4e690 a3=25 items=0 ppid=1 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:11.371000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 06:54:11.373177 kubelet[1592]: I0513 06:54:11.372243 1592 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 13 06:54:11.373177 kubelet[1592]: I0513 06:54:11.372306 1592 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 13 06:54:11.373177 kubelet[1592]: I0513 06:54:11.372375 1592 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 06:54:11.375477 kubelet[1592]: I0513 06:54:11.375440 1592 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 13 06:54:11.377024 kubelet[1592]: I0513 06:54:11.376947 1592 volume_manager.go:297] "Starting Kubelet Volume Manager" May 13 06:54:11.377154 kubelet[1592]: E0513 06:54:11.377141 1592 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"ci-3510-3-7-n-7f05b50207.novalocal\" not found" May 13 06:54:11.379019 kubelet[1592]: I0513 06:54:11.377610 1592 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 13 06:54:11.379019 kubelet[1592]: I0513 06:54:11.377666 1592 reconciler.go:26] "Reconciler: start to sync state" May 13 06:54:11.379019 kubelet[1592]: W0513 06:54:11.378525 1592 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.24.4.54:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.54:6443: connect: connection refused May 13 06:54:11.379019 kubelet[1592]: E0513 06:54:11.378588 1592 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.24.4.54:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.24.4.54:6443: connect: connection refused" logger="UnhandledError" May 13 06:54:11.379019 kubelet[1592]: E0513 06:54:11.378649 1592 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.54:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-n-7f05b50207.novalocal?timeout=10s\": dial tcp 172.24.4.54:6443: connect: connection refused" interval="200ms" May 13 06:54:11.381043 kubelet[1592]: I0513 06:54:11.381001 1592 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 06:54:11.381000 audit[1604]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1604 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:11.381000 audit[1604]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd1ab37f50 a2=0 a3=7ffd1ab37f3c items=0 ppid=1592 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:11.381000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 06:54:11.383463 kubelet[1592]: E0513 06:54:11.381201 1592 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.24.4.54:6443/api/v1/namespaces/default/events\": dial tcp 172.24.4.54:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-7-n-7f05b50207.novalocal.183f03b3d569284e default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-7-n-7f05b50207.novalocal,UID:ci-3510-3-7-n-7f05b50207.novalocal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-7-n-7f05b50207.novalocal,},FirstTimestamp:2025-05-13 06:54:11.35750971 +0000 UTC m=+0.684174643,LastTimestamp:2025-05-13 06:54:11.35750971 +0000 UTC m=+0.684174643,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-7-n-7f05b50207.novalocal,}" May 13 06:54:11.385288 kubelet[1592]: I0513 06:54:11.385256 1592 factory.go:221] Registration of the containerd container factory successfully May 13 06:54:11.385288 kubelet[1592]: I0513 06:54:11.385275 1592 factory.go:221] Registration of the systemd container factory successfully May 13 06:54:11.385000 audit[1605]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1605 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:11.385000 audit[1605]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc50ef5490 a2=0 a3=7ffc50ef547c items=0 ppid=1592 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:11.385000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 06:54:11.390000 audit[1607]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1607 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:11.390000 audit[1607]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe099dd5b0 a2=0 a3=7ffe099dd59c items=0 ppid=1592 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:11.390000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 06:54:11.392000 audit[1609]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1609 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:11.392000 audit[1609]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc5f072930 a2=0 a3=7ffc5f07291c items=0 ppid=1592 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:11.392000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 06:54:11.407000 audit[1612]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1612 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:11.407000 audit[1612]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc02f3e340 a2=0 a3=7ffc02f3e32c items=0 ppid=1592 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:11.407000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 13 06:54:11.410130 kubelet[1592]: I0513 06:54:11.410063 1592 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 06:54:11.410000 audit[1615]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1615 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:11.410000 audit[1615]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff4dbf7960 a2=0 a3=7fff4dbf794c items=0 ppid=1592 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:11.410000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 06:54:11.414606 kubelet[1592]: E0513 06:54:11.414566 1592 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 06:54:11.414723 kubelet[1592]: I0513 06:54:11.414639 1592 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 06:54:11.414723 kubelet[1592]: I0513 06:54:11.414656 1592 status_manager.go:227] "Starting to sync pod status with apiserver" May 13 06:54:11.414723 kubelet[1592]: I0513 06:54:11.414689 1592 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 13 06:54:11.414723 kubelet[1592]: I0513 06:54:11.414696 1592 kubelet.go:2388] "Starting kubelet main sync loop" May 13 06:54:11.415036 kubelet[1592]: E0513 06:54:11.414738 1592 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 13 06:54:11.414000 audit[1617]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1617 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:11.414000 audit[1617]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6b4483c0 a2=0 a3=7ffd6b4483ac items=0 ppid=1592 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:11.414000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 06:54:11.415000 audit[1618]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1618 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:11.415000 audit[1618]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb30099e0 a2=0 a3=7ffcb30099cc items=0 ppid=1592 pid=1618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:11.415000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 06:54:11.419250 kubelet[1592]: W0513 06:54:11.419212 1592 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.24.4.54:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.54:6443: connect: connection refused May 13 06:54:11.419354 kubelet[1592]: E0513 06:54:11.419252 1592 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.24.4.54:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.24.4.54:6443: connect: connection refused" logger="UnhandledError" May 13 06:54:11.418000 audit[1620]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1620 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:11.418000 audit[1620]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee9edbd60 a2=0 a3=7ffee9edbd4c items=0 ppid=1592 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:11.418000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 06:54:11.420000 audit[1621]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1621 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:11.420000 audit[1621]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff539359e0 a2=0 a3=7fff539359cc items=0 ppid=1592 pid=1621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:11.420000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 06:54:11.420000 audit[1622]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1622 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:11.420000 audit[1622]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffef5d2b890 a2=0 a3=7ffef5d2b87c items=0 ppid=1592 pid=1622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:11.420000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 06:54:11.422000 audit[1623]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1623 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:11.422000 audit[1623]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff462f6540 a2=0 a3=7fff462f652c items=0 ppid=1592 pid=1623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:11.422000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 06:54:11.433502 kubelet[1592]: I0513 06:54:11.433486 1592 cpu_manager.go:221] "Starting CPU manager" policy="none" May 13 06:54:11.433586 kubelet[1592]: I0513 06:54:11.433576 1592 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 13 06:54:11.433650 kubelet[1592]: I0513 06:54:11.433641 1592 state_mem.go:36] "Initialized new in-memory state store" May 13 06:54:11.439400 kubelet[1592]: I0513 06:54:11.439389 1592 policy_none.go:49] "None policy: Start" May 13 06:54:11.439469 kubelet[1592]: I0513 06:54:11.439460 1592 memory_manager.go:186] "Starting memorymanager" policy="None" May 13 06:54:11.439532 kubelet[1592]: I0513 06:54:11.439523 1592 state_mem.go:35] "Initializing new in-memory state store" May 13 06:54:11.445930 systemd[1]: Created slice kubepods.slice. May 13 06:54:11.450612 systemd[1]: Created slice kubepods-burstable.slice. May 13 06:54:11.453786 systemd[1]: Created slice kubepods-besteffort.slice. May 13 06:54:11.459523 kubelet[1592]: I0513 06:54:11.459503 1592 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 06:54:11.458000 audit[1592]: AVC avc: denied { mac_admin } for pid=1592 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:11.458000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 06:54:11.458000 audit[1592]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c4fa40 a1=c000d780d8 a2=c000c4fa10 a3=25 items=0 ppid=1 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:11.458000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 06:54:11.460266 kubelet[1592]: I0513 06:54:11.460248 1592 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 13 06:54:11.460418 kubelet[1592]: I0513 06:54:11.460406 1592 eviction_manager.go:189] "Eviction manager: starting control loop" May 13 06:54:11.460535 kubelet[1592]: I0513 06:54:11.460498 1592 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 06:54:11.461101 kubelet[1592]: I0513 06:54:11.461089 1592 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 06:54:11.462136 kubelet[1592]: E0513 06:54:11.462123 1592 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 13 06:54:11.462223 kubelet[1592]: E0513 06:54:11.462212 1592 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-7-n-7f05b50207.novalocal\" not found" May 13 06:54:11.536518 systemd[1]: Created slice kubepods-burstable-poddfe1d6db0df1811146821f3639128d15.slice. May 13 06:54:11.560456 kubelet[1592]: E0513 06:54:11.560341 1592 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-n-7f05b50207.novalocal\" not found" node="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:11.565693 kubelet[1592]: I0513 06:54:11.564353 1592 kubelet_node_status.go:76] "Attempting to register node" node="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:11.565693 kubelet[1592]: E0513 06:54:11.564891 1592 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://172.24.4.54:6443/api/v1/nodes\": dial tcp 172.24.4.54:6443: connect: connection refused" node="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:11.565376 systemd[1]: Created slice kubepods-burstable-pode18186c4ba8c102f107479194aede059.slice. May 13 06:54:11.575343 kubelet[1592]: E0513 06:54:11.575277 1592 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-n-7f05b50207.novalocal\" not found" node="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:11.581334 systemd[1]: Created slice kubepods-burstable-poda141f550a1d6fc66b92649056a11858c.slice. May 13 06:54:11.582225 kubelet[1592]: E0513 06:54:11.582126 1592 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.54:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-n-7f05b50207.novalocal?timeout=10s\": dial tcp 172.24.4.54:6443: connect: connection refused" interval="400ms" May 13 06:54:11.585097 kubelet[1592]: E0513 06:54:11.585056 1592 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-n-7f05b50207.novalocal\" not found" node="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:11.680068 kubelet[1592]: I0513 06:54:11.679988 1592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e18186c4ba8c102f107479194aede059-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal\" (UID: \"e18186c4ba8c102f107479194aede059\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:11.680229 kubelet[1592]: I0513 06:54:11.680070 1592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/dfe1d6db0df1811146821f3639128d15-ca-certs\") pod \"kube-apiserver-ci-3510-3-7-n-7f05b50207.novalocal\" (UID: \"dfe1d6db0df1811146821f3639128d15\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:11.680229 kubelet[1592]: I0513 06:54:11.680125 1592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/dfe1d6db0df1811146821f3639128d15-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-7-n-7f05b50207.novalocal\" (UID: \"dfe1d6db0df1811146821f3639128d15\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:11.680229 kubelet[1592]: I0513 06:54:11.680174 1592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/e18186c4ba8c102f107479194aede059-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal\" (UID: \"e18186c4ba8c102f107479194aede059\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:11.680229 kubelet[1592]: I0513 06:54:11.680217 1592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e18186c4ba8c102f107479194aede059-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal\" (UID: \"e18186c4ba8c102f107479194aede059\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:11.680557 kubelet[1592]: I0513 06:54:11.680336 1592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e18186c4ba8c102f107479194aede059-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal\" (UID: \"e18186c4ba8c102f107479194aede059\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:11.680557 kubelet[1592]: I0513 06:54:11.680388 1592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a141f550a1d6fc66b92649056a11858c-kubeconfig\") pod \"kube-scheduler-ci-3510-3-7-n-7f05b50207.novalocal\" (UID: \"a141f550a1d6fc66b92649056a11858c\") " pod="kube-system/kube-scheduler-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:11.680557 kubelet[1592]: I0513 06:54:11.680433 1592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/dfe1d6db0df1811146821f3639128d15-k8s-certs\") pod \"kube-apiserver-ci-3510-3-7-n-7f05b50207.novalocal\" (UID: \"dfe1d6db0df1811146821f3639128d15\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:11.680557 kubelet[1592]: I0513 06:54:11.680474 1592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e18186c4ba8c102f107479194aede059-ca-certs\") pod \"kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal\" (UID: \"e18186c4ba8c102f107479194aede059\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:11.768978 kubelet[1592]: I0513 06:54:11.768866 1592 kubelet_node_status.go:76] "Attempting to register node" node="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:11.769868 kubelet[1592]: E0513 06:54:11.769812 1592 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://172.24.4.54:6443/api/v1/nodes\": dial tcp 172.24.4.54:6443: connect: connection refused" node="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:11.863650 env[1155]: time="2025-05-13T06:54:11.862101168Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-7-n-7f05b50207.novalocal,Uid:dfe1d6db0df1811146821f3639128d15,Namespace:kube-system,Attempt:0,}" May 13 06:54:11.881716 env[1155]: time="2025-05-13T06:54:11.881611239Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal,Uid:e18186c4ba8c102f107479194aede059,Namespace:kube-system,Attempt:0,}" May 13 06:54:11.886588 env[1155]: time="2025-05-13T06:54:11.886498012Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-7-n-7f05b50207.novalocal,Uid:a141f550a1d6fc66b92649056a11858c,Namespace:kube-system,Attempt:0,}" May 13 06:54:11.983650 kubelet[1592]: E0513 06:54:11.983486 1592 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.54:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-n-7f05b50207.novalocal?timeout=10s\": dial tcp 172.24.4.54:6443: connect: connection refused" interval="800ms" May 13 06:54:12.173323 kubelet[1592]: I0513 06:54:12.173213 1592 kubelet_node_status.go:76] "Attempting to register node" node="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:12.173912 kubelet[1592]: E0513 06:54:12.173821 1592 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://172.24.4.54:6443/api/v1/nodes\": dial tcp 172.24.4.54:6443: connect: connection refused" node="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:12.203379 kubelet[1592]: W0513 06:54:12.203297 1592 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.24.4.54:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.54:6443: connect: connection refused May 13 06:54:12.203530 kubelet[1592]: E0513 06:54:12.203383 1592 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.24.4.54:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.24.4.54:6443: connect: connection refused" logger="UnhandledError" May 13 06:54:12.275674 kubelet[1592]: W0513 06:54:12.275528 1592 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.24.4.54:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.24.4.54:6443: connect: connection refused May 13 06:54:12.275674 kubelet[1592]: E0513 06:54:12.275666 1592 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.24.4.54:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.24.4.54:6443: connect: connection refused" logger="UnhandledError" May 13 06:54:12.299315 kubelet[1592]: W0513 06:54:12.299202 1592 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.24.4.54:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-n-7f05b50207.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.54:6443: connect: connection refused May 13 06:54:12.299460 kubelet[1592]: E0513 06:54:12.299318 1592 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.24.4.54:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-n-7f05b50207.novalocal&limit=500&resourceVersion=0\": dial tcp 172.24.4.54:6443: connect: connection refused" logger="UnhandledError" May 13 06:54:12.441694 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2413408610.mount: Deactivated successfully. May 13 06:54:12.456242 env[1155]: time="2025-05-13T06:54:12.456124001Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:12.461671 env[1155]: time="2025-05-13T06:54:12.461604144Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:12.465992 env[1155]: time="2025-05-13T06:54:12.464039640Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:12.469007 env[1155]: time="2025-05-13T06:54:12.468912616Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:12.472614 env[1155]: time="2025-05-13T06:54:12.472512361Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:12.475691 env[1155]: time="2025-05-13T06:54:12.475638295Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:12.486765 env[1155]: time="2025-05-13T06:54:12.486713012Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:12.503324 env[1155]: time="2025-05-13T06:54:12.503243696Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:12.511572 env[1155]: time="2025-05-13T06:54:12.511477207Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:12.514616 env[1155]: time="2025-05-13T06:54:12.514562412Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:12.516508 env[1155]: time="2025-05-13T06:54:12.516451507Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:12.517524 env[1155]: time="2025-05-13T06:54:12.517494053Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:12.563358 env[1155]: time="2025-05-13T06:54:12.562703803Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 06:54:12.563358 env[1155]: time="2025-05-13T06:54:12.562742798Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 06:54:12.563358 env[1155]: time="2025-05-13T06:54:12.562774839Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 06:54:12.563358 env[1155]: time="2025-05-13T06:54:12.562966056Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4510513a82434bf77ad914575e0cb22d7b761237ac7b69caf5d611be62e44975 pid=1633 runtime=io.containerd.runc.v2 May 13 06:54:12.594535 env[1155]: time="2025-05-13T06:54:12.594409642Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 06:54:12.594899 env[1155]: time="2025-05-13T06:54:12.594810853Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 06:54:12.595142 env[1155]: time="2025-05-13T06:54:12.594870178Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 06:54:12.596393 env[1155]: time="2025-05-13T06:54:12.596273147Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 06:54:12.596393 env[1155]: time="2025-05-13T06:54:12.596387998Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 06:54:12.596583 env[1155]: time="2025-05-13T06:54:12.596417915Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 06:54:12.596583 env[1155]: time="2025-05-13T06:54:12.596563285Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2f32068ad9b54825f3d0fcef3bae1b2b9e729d1f26cf61188e781899f965cb7d pid=1669 runtime=io.containerd.runc.v2 May 13 06:54:12.598677 env[1155]: time="2025-05-13T06:54:12.596742440Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ca28d42c19d62fd5d726e9a53774e1a2f35477b3db2b28d6ef8dd2b6c15b8a0f pid=1655 runtime=io.containerd.runc.v2 May 13 06:54:12.608392 systemd[1]: Started cri-containerd-4510513a82434bf77ad914575e0cb22d7b761237ac7b69caf5d611be62e44975.scope. May 13 06:54:12.628147 systemd[1]: Started cri-containerd-ca28d42c19d62fd5d726e9a53774e1a2f35477b3db2b28d6ef8dd2b6c15b8a0f.scope. May 13 06:54:12.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.633000 audit: BPF prog-id=58 op=LOAD May 13 06:54:12.634000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.634000 audit[1641]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1633 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435313035313361383234333462663737616439313435373565306362 May 13 06:54:12.634000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.634000 audit[1641]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1633 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435313035313361383234333462663737616439313435373565306362 May 13 06:54:12.635000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.635000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.635000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.635000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.635000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.635000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.635000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.635000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.635000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.635000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.635000 audit: BPF prog-id=59 op=LOAD May 13 06:54:12.635000 audit[1641]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000093ae0 items=0 ppid=1633 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435313035313361383234333462663737616439313435373565306362 May 13 06:54:12.636000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.636000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.636000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.636000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.636000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.636000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.636000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.636000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.636000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.636000 audit: BPF prog-id=60 op=LOAD May 13 06:54:12.636000 audit[1641]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000093b28 items=0 ppid=1633 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435313035313361383234333462663737616439313435373565306362 May 13 06:54:12.636000 audit: BPF prog-id=60 op=UNLOAD May 13 06:54:12.636000 audit: BPF prog-id=59 op=UNLOAD May 13 06:54:12.636000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.636000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.636000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.636000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.636000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.636000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.636000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.636000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.636000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.636000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.636000 audit: BPF prog-id=61 op=LOAD May 13 06:54:12.636000 audit[1641]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000093f38 items=0 ppid=1633 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435313035313361383234333462663737616439313435373565306362 May 13 06:54:12.643413 systemd[1]: Started cri-containerd-2f32068ad9b54825f3d0fcef3bae1b2b9e729d1f26cf61188e781899f965cb7d.scope. May 13 06:54:12.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.646000 audit: BPF prog-id=62 op=LOAD May 13 06:54:12.646000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.646000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1655 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361323864343263313964363266643564373236653961353337373465 May 13 06:54:12.646000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.646000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1655 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361323864343263313964363266643564373236653961353337373465 May 13 06:54:12.646000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.646000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.646000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.646000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.646000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.646000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.646000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.646000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.646000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.646000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.646000 audit: BPF prog-id=63 op=LOAD May 13 06:54:12.646000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000302de0 items=0 ppid=1655 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361323864343263313964363266643564373236653961353337373465 May 13 06:54:12.647000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.647000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.647000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.647000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.647000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.647000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.647000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.647000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.647000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.647000 audit: BPF prog-id=64 op=LOAD May 13 06:54:12.647000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000302e28 items=0 ppid=1655 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361323864343263313964363266643564373236653961353337373465 May 13 06:54:12.647000 audit: BPF prog-id=64 op=UNLOAD May 13 06:54:12.647000 audit: BPF prog-id=63 op=UNLOAD May 13 06:54:12.647000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.647000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.647000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.647000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.647000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.647000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.647000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.647000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.647000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.647000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.647000 audit: BPF prog-id=65 op=LOAD May 13 06:54:12.647000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000303238 items=0 ppid=1655 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361323864343263313964363266643564373236653961353337373465 May 13 06:54:12.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.668000 audit: BPF prog-id=66 op=LOAD May 13 06:54:12.669000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1669 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333230363861643962353438323566336430666365663362616531 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1669 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333230363861643962353438323566336430666365663362616531 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit: BPF prog-id=67 op=LOAD May 13 06:54:12.669000 audit[1688]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003dc5c0 items=0 ppid=1669 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333230363861643962353438323566336430666365663362616531 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit: BPF prog-id=68 op=LOAD May 13 06:54:12.669000 audit[1688]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003dc608 items=0 ppid=1669 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333230363861643962353438323566336430666365663362616531 May 13 06:54:12.669000 audit: BPF prog-id=68 op=UNLOAD May 13 06:54:12.669000 audit: BPF prog-id=67 op=UNLOAD May 13 06:54:12.669000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.669000 audit: BPF prog-id=69 op=LOAD May 13 06:54:12.669000 audit[1688]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003dca18 items=0 ppid=1669 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333230363861643962353438323566336430666365663362616531 May 13 06:54:12.690640 kubelet[1592]: W0513 06:54:12.690569 1592 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.24.4.54:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.54:6443: connect: connection refused May 13 06:54:12.690640 kubelet[1592]: E0513 06:54:12.690608 1592 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.24.4.54:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.24.4.54:6443: connect: connection refused" logger="UnhandledError" May 13 06:54:12.706328 env[1155]: time="2025-05-13T06:54:12.706205458Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-7-n-7f05b50207.novalocal,Uid:dfe1d6db0df1811146821f3639128d15,Namespace:kube-system,Attempt:0,} returns sandbox id \"4510513a82434bf77ad914575e0cb22d7b761237ac7b69caf5d611be62e44975\"" May 13 06:54:12.707177 env[1155]: time="2025-05-13T06:54:12.707129636Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-7-n-7f05b50207.novalocal,Uid:a141f550a1d6fc66b92649056a11858c,Namespace:kube-system,Attempt:0,} returns sandbox id \"ca28d42c19d62fd5d726e9a53774e1a2f35477b3db2b28d6ef8dd2b6c15b8a0f\"" May 13 06:54:12.710998 env[1155]: time="2025-05-13T06:54:12.710964284Z" level=info msg="CreateContainer within sandbox \"4510513a82434bf77ad914575e0cb22d7b761237ac7b69caf5d611be62e44975\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 13 06:54:12.711603 env[1155]: time="2025-05-13T06:54:12.711578796Z" level=info msg="CreateContainer within sandbox \"ca28d42c19d62fd5d726e9a53774e1a2f35477b3db2b28d6ef8dd2b6c15b8a0f\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 13 06:54:12.720327 env[1155]: time="2025-05-13T06:54:12.720263044Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal,Uid:e18186c4ba8c102f107479194aede059,Namespace:kube-system,Attempt:0,} returns sandbox id \"2f32068ad9b54825f3d0fcef3bae1b2b9e729d1f26cf61188e781899f965cb7d\"" May 13 06:54:12.724599 env[1155]: time="2025-05-13T06:54:12.724565151Z" level=info msg="CreateContainer within sandbox \"2f32068ad9b54825f3d0fcef3bae1b2b9e729d1f26cf61188e781899f965cb7d\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 13 06:54:12.747488 env[1155]: time="2025-05-13T06:54:12.747429790Z" level=info msg="CreateContainer within sandbox \"ca28d42c19d62fd5d726e9a53774e1a2f35477b3db2b28d6ef8dd2b6c15b8a0f\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"91ecbbbb6162072cdb453ed73fa0d04b34eb79aa1b9fabb9bcff1016d0169766\"" May 13 06:54:12.748118 env[1155]: time="2025-05-13T06:54:12.748085783Z" level=info msg="StartContainer for \"91ecbbbb6162072cdb453ed73fa0d04b34eb79aa1b9fabb9bcff1016d0169766\"" May 13 06:54:12.762192 env[1155]: time="2025-05-13T06:54:12.762107068Z" level=info msg="CreateContainer within sandbox \"4510513a82434bf77ad914575e0cb22d7b761237ac7b69caf5d611be62e44975\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"513ccffcb1968aa65ac25af48ef0cceb043c84cc75b1842b41cf428ac4d89a54\"" May 13 06:54:12.762700 env[1155]: time="2025-05-13T06:54:12.762671815Z" level=info msg="StartContainer for \"513ccffcb1968aa65ac25af48ef0cceb043c84cc75b1842b41cf428ac4d89a54\"" May 13 06:54:12.767336 systemd[1]: Started cri-containerd-91ecbbbb6162072cdb453ed73fa0d04b34eb79aa1b9fabb9bcff1016d0169766.scope. May 13 06:54:12.774417 env[1155]: time="2025-05-13T06:54:12.774360343Z" level=info msg="CreateContainer within sandbox \"2f32068ad9b54825f3d0fcef3bae1b2b9e729d1f26cf61188e781899f965cb7d\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"0e645aa4ff1e6e9ff9c0d9741d62897165cb59dadb399b86295d9007a9e3b6e5\"" May 13 06:54:12.777888 env[1155]: time="2025-05-13T06:54:12.777850518Z" level=info msg="StartContainer for \"0e645aa4ff1e6e9ff9c0d9741d62897165cb59dadb399b86295d9007a9e3b6e5\"" May 13 06:54:12.793487 kubelet[1592]: E0513 06:54:12.793077 1592 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.54:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-n-7f05b50207.novalocal?timeout=10s\": dial tcp 172.24.4.54:6443: connect: connection refused" interval="1.6s" May 13 06:54:12.798139 systemd[1]: Started cri-containerd-513ccffcb1968aa65ac25af48ef0cceb043c84cc75b1842b41cf428ac4d89a54.scope. May 13 06:54:12.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.799000 audit: BPF prog-id=70 op=LOAD May 13 06:54:12.801000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.801000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1655 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931656362626262363136323037326364623435336564373366613064 May 13 06:54:12.802000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.802000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1655 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931656362626262363136323037326364623435336564373366613064 May 13 06:54:12.802000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.802000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.802000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.802000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.802000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.802000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.802000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.802000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.802000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.802000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.802000 audit: BPF prog-id=71 op=LOAD May 13 06:54:12.802000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000313e10 items=0 ppid=1655 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931656362626262363136323037326364623435336564373366613064 May 13 06:54:12.803000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.803000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.803000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.803000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.803000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.803000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.803000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.803000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.803000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.803000 audit: BPF prog-id=72 op=LOAD May 13 06:54:12.803000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000313e58 items=0 ppid=1655 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931656362626262363136323037326364623435336564373366613064 May 13 06:54:12.804000 audit: BPF prog-id=72 op=UNLOAD May 13 06:54:12.804000 audit: BPF prog-id=71 op=UNLOAD May 13 06:54:12.804000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.804000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.804000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.804000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.804000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.804000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.804000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.804000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.804000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.804000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.804000 audit: BPF prog-id=73 op=LOAD May 13 06:54:12.804000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000386268 items=0 ppid=1655 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931656362626262363136323037326364623435336564373366613064 May 13 06:54:12.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.813000 audit: BPF prog-id=74 op=LOAD May 13 06:54:12.813000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.813000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1633 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531336363666663623139363861613635616332356166343865663063 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1633 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531336363666663623139363861613635616332356166343865663063 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit: BPF prog-id=75 op=LOAD May 13 06:54:12.814000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00039a8b0 items=0 ppid=1633 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531336363666663623139363861613635616332356166343865663063 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit: BPF prog-id=76 op=LOAD May 13 06:54:12.814000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00039a8f8 items=0 ppid=1633 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531336363666663623139363861613635616332356166343865663063 May 13 06:54:12.814000 audit: BPF prog-id=76 op=UNLOAD May 13 06:54:12.814000 audit: BPF prog-id=75 op=UNLOAD May 13 06:54:12.814000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.814000 audit: BPF prog-id=77 op=LOAD May 13 06:54:12.814000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00039ad08 items=0 ppid=1633 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531336363666663623139363861613635616332356166343865663063 May 13 06:54:12.825851 systemd[1]: Started cri-containerd-0e645aa4ff1e6e9ff9c0d9741d62897165cb59dadb399b86295d9007a9e3b6e5.scope. May 13 06:54:12.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.864000 audit: BPF prog-id=78 op=LOAD May 13 06:54:12.866663 env[1155]: time="2025-05-13T06:54:12.866626566Z" level=info msg="StartContainer for \"91ecbbbb6162072cdb453ed73fa0d04b34eb79aa1b9fabb9bcff1016d0169766\" returns successfully" May 13 06:54:12.866000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.866000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1669 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065363435616134666631653665396666396330643937343164363238 May 13 06:54:12.871000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.871000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1669 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065363435616134666631653665396666396330643937343164363238 May 13 06:54:12.871000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.871000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.871000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.871000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.871000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.871000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.871000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.871000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.871000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.871000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.871000 audit: BPF prog-id=79 op=LOAD May 13 06:54:12.871000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003b29d0 items=0 ppid=1669 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065363435616134666631653665396666396330643937343164363238 May 13 06:54:12.872000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.872000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.872000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.872000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.872000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.872000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.872000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.872000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.872000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.872000 audit: BPF prog-id=80 op=LOAD May 13 06:54:12.872000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003b2a18 items=0 ppid=1669 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065363435616134666631653665396666396330643937343164363238 May 13 06:54:12.873000 audit: BPF prog-id=80 op=UNLOAD May 13 06:54:12.874212 env[1155]: time="2025-05-13T06:54:12.874150291Z" level=info msg="StartContainer for \"513ccffcb1968aa65ac25af48ef0cceb043c84cc75b1842b41cf428ac4d89a54\" returns successfully" May 13 06:54:12.873000 audit: BPF prog-id=79 op=UNLOAD May 13 06:54:12.873000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.873000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.873000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.873000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.873000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.873000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.873000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.873000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.873000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.873000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:12.873000 audit: BPF prog-id=81 op=LOAD May 13 06:54:12.873000 audit[1809]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003b2e28 items=0 ppid=1669 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:12.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065363435616134666631653665396666396330643937343164363238 May 13 06:54:12.920676 env[1155]: time="2025-05-13T06:54:12.920612190Z" level=info msg="StartContainer for \"0e645aa4ff1e6e9ff9c0d9741d62897165cb59dadb399b86295d9007a9e3b6e5\" returns successfully" May 13 06:54:12.978506 kubelet[1592]: I0513 06:54:12.978383 1592 kubelet_node_status.go:76] "Attempting to register node" node="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:13.426241 kubelet[1592]: E0513 06:54:13.426211 1592 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-n-7f05b50207.novalocal\" not found" node="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:13.428194 kubelet[1592]: E0513 06:54:13.428170 1592 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-n-7f05b50207.novalocal\" not found" node="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:13.430150 kubelet[1592]: E0513 06:54:13.430130 1592 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-n-7f05b50207.novalocal\" not found" node="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:14.432810 kubelet[1592]: E0513 06:54:14.432774 1592 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-n-7f05b50207.novalocal\" not found" node="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:14.433228 kubelet[1592]: E0513 06:54:14.433069 1592 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510-3-7-n-7f05b50207.novalocal\" not found" node="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:14.461000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:54:14.461000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000cd0000 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:54:14.461000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:54:14.461000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:54:14.461000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000183a00 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:54:14.461000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:54:14.803000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:54:14.803000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0086aa5a0 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:54:14.803000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:54:14.803000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:54:14.803000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0056be280 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:54:14.803000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:54:14.804000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:54:14.804000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0056b1650 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:54:14.804000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:54:14.809000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:54:14.809000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c0086aa810 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:54:14.809000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:54:14.863000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:54:14.863000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c003687640 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:54:14.863000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:54:14.863000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:54:14.863000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c0071667b0 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:54:14.863000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:54:14.956969 kubelet[1592]: E0513 06:54:14.956910 1592 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-7-n-7f05b50207.novalocal\" not found" node="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:15.030778 kubelet[1592]: E0513 06:54:15.030624 1592 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{ci-3510-3-7-n-7f05b50207.novalocal.183f03b3d569284e default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-7-n-7f05b50207.novalocal,UID:ci-3510-3-7-n-7f05b50207.novalocal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-7-n-7f05b50207.novalocal,},FirstTimestamp:2025-05-13 06:54:11.35750971 +0000 UTC m=+0.684174643,LastTimestamp:2025-05-13 06:54:11.35750971 +0000 UTC m=+0.684174643,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-7-n-7f05b50207.novalocal,}" May 13 06:54:15.085353 kubelet[1592]: I0513 06:54:15.085153 1592 kubelet_node_status.go:79] "Successfully registered node" node="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:15.085353 kubelet[1592]: E0513 06:54:15.085193 1592 kubelet_node_status.go:549] "Error updating node status, will retry" err="error getting node \"ci-3510-3-7-n-7f05b50207.novalocal\": node \"ci-3510-3-7-n-7f05b50207.novalocal\" not found" May 13 06:54:15.092595 kubelet[1592]: E0513 06:54:15.092510 1592 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"ci-3510-3-7-n-7f05b50207.novalocal\" not found" May 13 06:54:15.096311 kubelet[1592]: E0513 06:54:15.096201 1592 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{ci-3510-3-7-n-7f05b50207.novalocal.183f03b3d8cf84bc default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-7-n-7f05b50207.novalocal,UID:ci-3510-3-7-n-7f05b50207.novalocal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:ci-3510-3-7-n-7f05b50207.novalocal,},FirstTimestamp:2025-05-13 06:54:11.414549692 +0000 UTC m=+0.741214535,LastTimestamp:2025-05-13 06:54:11.414549692 +0000 UTC m=+0.741214535,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-7-n-7f05b50207.novalocal,}" May 13 06:54:15.278483 kubelet[1592]: I0513 06:54:15.278408 1592 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:15.291795 kubelet[1592]: E0513 06:54:15.291719 1592 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-ci-3510-3-7-n-7f05b50207.novalocal\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:15.292287 kubelet[1592]: I0513 06:54:15.292171 1592 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:15.295891 kubelet[1592]: E0513 06:54:15.295824 1592 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:15.296166 kubelet[1592]: I0513 06:54:15.296136 1592 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:15.300243 kubelet[1592]: E0513 06:54:15.300200 1592 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-ci-3510-3-7-n-7f05b50207.novalocal\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:15.317650 kubelet[1592]: I0513 06:54:15.317585 1592 apiserver.go:52] "Watching apiserver" May 13 06:54:15.377741 kubelet[1592]: I0513 06:54:15.377697 1592 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 13 06:54:17.461041 systemd[1]: Reloading. May 13 06:54:17.585981 /usr/lib/systemd/system-generators/torcx-generator[1884]: time="2025-05-13T06:54:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 06:54:17.589588 /usr/lib/systemd/system-generators/torcx-generator[1884]: time="2025-05-13T06:54:17Z" level=info msg="torcx already run" May 13 06:54:17.679047 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 06:54:17.679234 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 06:54:17.702086 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 06:54:17.796948 kernel: kauditd_printk_skb: 733 callbacks suppressed May 13 06:54:17.797116 kernel: audit: type=1400 audit(1747119257.792:493): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.799948 kernel: audit: type=1400 audit(1747119257.792:494): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.809739 kernel: audit: type=1400 audit(1747119257.795:495): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.809808 kernel: audit: type=1400 audit(1747119257.795:496): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.814249 kernel: audit: type=1400 audit(1747119257.795:497): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.823732 kernel: audit: type=1400 audit(1747119257.795:498): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.823784 kernel: audit: type=1400 audit(1747119257.795:499): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.833135 kernel: audit: type=1400 audit(1747119257.795:500): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.833511 kubelet[1592]: I0513 06:54:17.833477 1592 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:17.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.838500 kernel: audit: type=1400 audit(1747119257.795:501): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.838629 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 13 06:54:17.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.799000 audit: BPF prog-id=82 op=LOAD May 13 06:54:17.799000 audit: BPF prog-id=43 op=UNLOAD May 13 06:54:17.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.804000 audit: BPF prog-id=83 op=LOAD May 13 06:54:17.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.804000 audit: BPF prog-id=84 op=LOAD May 13 06:54:17.804000 audit: BPF prog-id=44 op=UNLOAD May 13 06:54:17.804000 audit: BPF prog-id=45 op=UNLOAD May 13 06:54:17.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.823000 audit: BPF prog-id=85 op=LOAD May 13 06:54:17.823000 audit: BPF prog-id=46 op=UNLOAD May 13 06:54:17.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.827000 audit: BPF prog-id=86 op=LOAD May 13 06:54:17.827000 audit: BPF prog-id=58 op=UNLOAD May 13 06:54:17.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.832000 audit: BPF prog-id=87 op=LOAD May 13 06:54:17.832000 audit: BPF prog-id=62 op=UNLOAD May 13 06:54:17.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.841557 kubelet[1592]: W0513 06:54:17.841133 1592 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 13 06:54:17.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.841000 audit: BPF prog-id=88 op=LOAD May 13 06:54:17.841000 audit: BPF prog-id=78 op=UNLOAD May 13 06:54:17.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.842000 audit: BPF prog-id=89 op=LOAD May 13 06:54:17.842000 audit: BPF prog-id=66 op=UNLOAD May 13 06:54:17.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.843000 audit: BPF prog-id=90 op=LOAD May 13 06:54:17.844000 audit: BPF prog-id=47 op=UNLOAD May 13 06:54:17.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit: BPF prog-id=91 op=LOAD May 13 06:54:17.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit: BPF prog-id=92 op=LOAD May 13 06:54:17.845000 audit: BPF prog-id=48 op=UNLOAD May 13 06:54:17.845000 audit: BPF prog-id=49 op=UNLOAD May 13 06:54:17.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.845000 audit: BPF prog-id=93 op=LOAD May 13 06:54:17.845000 audit: BPF prog-id=50 op=UNLOAD May 13 06:54:17.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.847000 audit: BPF prog-id=94 op=LOAD May 13 06:54:17.847000 audit: BPF prog-id=70 op=UNLOAD May 13 06:54:17.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.847000 audit: BPF prog-id=95 op=LOAD May 13 06:54:17.847000 audit: BPF prog-id=74 op=UNLOAD May 13 06:54:17.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.848000 audit: BPF prog-id=96 op=LOAD May 13 06:54:17.848000 audit: BPF prog-id=51 op=UNLOAD May 13 06:54:17.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.851000 audit: BPF prog-id=97 op=LOAD May 13 06:54:17.851000 audit: BPF prog-id=52 op=UNLOAD May 13 06:54:17.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit: BPF prog-id=98 op=LOAD May 13 06:54:17.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit: BPF prog-id=99 op=LOAD May 13 06:54:17.852000 audit: BPF prog-id=53 op=UNLOAD May 13 06:54:17.852000 audit: BPF prog-id=54 op=UNLOAD May 13 06:54:17.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit: BPF prog-id=100 op=LOAD May 13 06:54:17.852000 audit: BPF prog-id=55 op=UNLOAD May 13 06:54:17.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.853000 audit: BPF prog-id=101 op=LOAD May 13 06:54:17.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:17.853000 audit: BPF prog-id=102 op=LOAD May 13 06:54:17.853000 audit: BPF prog-id=56 op=UNLOAD May 13 06:54:17.853000 audit: BPF prog-id=57 op=UNLOAD May 13 06:54:17.878415 systemd[1]: Stopping kubelet.service... May 13 06:54:17.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:54:17.904228 systemd[1]: kubelet.service: Deactivated successfully. May 13 06:54:17.904404 systemd[1]: Stopped kubelet.service. May 13 06:54:17.904469 systemd[1]: kubelet.service: Consumed 1.144s CPU time. May 13 06:54:17.906215 systemd[1]: Starting kubelet.service... May 13 06:54:18.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:54:18.066538 systemd[1]: Started kubelet.service. May 13 06:54:18.130690 kubelet[1935]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 06:54:18.130690 kubelet[1935]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 13 06:54:18.130690 kubelet[1935]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 06:54:18.130690 kubelet[1935]: I0513 06:54:18.130320 1935 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 06:54:18.145751 kubelet[1935]: I0513 06:54:18.145684 1935 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 13 06:54:18.145751 kubelet[1935]: I0513 06:54:18.145715 1935 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 06:54:18.146126 kubelet[1935]: I0513 06:54:18.146007 1935 server.go:954] "Client rotation is on, will bootstrap in background" May 13 06:54:18.147333 kubelet[1935]: I0513 06:54:18.147308 1935 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 13 06:54:18.149602 kubelet[1935]: I0513 06:54:18.149565 1935 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 06:54:18.155789 kubelet[1935]: E0513 06:54:18.155743 1935 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 13 06:54:18.155789 kubelet[1935]: I0513 06:54:18.155772 1935 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 13 06:54:18.159440 kubelet[1935]: I0513 06:54:18.158790 1935 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 06:54:18.159440 kubelet[1935]: I0513 06:54:18.159262 1935 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 06:54:18.161747 kubelet[1935]: I0513 06:54:18.159329 1935 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-7-n-7f05b50207.novalocal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 13 06:54:18.161747 kubelet[1935]: I0513 06:54:18.161693 1935 topology_manager.go:138] "Creating topology manager with none policy" May 13 06:54:18.161747 kubelet[1935]: I0513 06:54:18.161709 1935 container_manager_linux.go:304] "Creating device plugin manager" May 13 06:54:18.162309 kubelet[1935]: I0513 06:54:18.161774 1935 state_mem.go:36] "Initialized new in-memory state store" May 13 06:54:18.162309 kubelet[1935]: I0513 06:54:18.162061 1935 kubelet.go:446] "Attempting to sync node with API server" May 13 06:54:18.162309 kubelet[1935]: I0513 06:54:18.162082 1935 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 06:54:18.162309 kubelet[1935]: I0513 06:54:18.162104 1935 kubelet.go:352] "Adding apiserver pod source" May 13 06:54:18.162309 kubelet[1935]: I0513 06:54:18.162114 1935 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 06:54:18.179957 kubelet[1935]: I0513 06:54:18.179840 1935 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 06:54:18.180476 kubelet[1935]: I0513 06:54:18.180431 1935 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 06:54:18.181081 kubelet[1935]: I0513 06:54:18.181051 1935 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 13 06:54:18.181275 kubelet[1935]: I0513 06:54:18.181086 1935 server.go:1287] "Started kubelet" May 13 06:54:18.182000 audit[1935]: AVC avc: denied { mac_admin } for pid=1935 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:18.182000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 06:54:18.182000 audit[1935]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000495260 a1=c000c62990 a2=c000495230 a3=25 items=0 ppid=1 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:18.182000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 06:54:18.182000 audit[1935]: AVC avc: denied { mac_admin } for pid=1935 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:18.182000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 06:54:18.182000 audit[1935]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c49d60 a1=c000c629a8 a2=c0004952f0 a3=25 items=0 ppid=1 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:18.182000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 06:54:18.184459 kubelet[1935]: I0513 06:54:18.183682 1935 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 13 06:54:18.184459 kubelet[1935]: I0513 06:54:18.183726 1935 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 13 06:54:18.184459 kubelet[1935]: I0513 06:54:18.183782 1935 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 06:54:18.190006 kubelet[1935]: I0513 06:54:18.189839 1935 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 13 06:54:18.191436 kubelet[1935]: I0513 06:54:18.191085 1935 server.go:490] "Adding debug handlers to kubelet server" May 13 06:54:18.192781 kubelet[1935]: I0513 06:54:18.192460 1935 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 06:54:18.192781 kubelet[1935]: I0513 06:54:18.192736 1935 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 06:54:18.193077 kubelet[1935]: I0513 06:54:18.193014 1935 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 13 06:54:18.197744 kubelet[1935]: I0513 06:54:18.195486 1935 volume_manager.go:297] "Starting Kubelet Volume Manager" May 13 06:54:18.197744 kubelet[1935]: E0513 06:54:18.195729 1935 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"ci-3510-3-7-n-7f05b50207.novalocal\" not found" May 13 06:54:18.197937 kubelet[1935]: I0513 06:54:18.197901 1935 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 13 06:54:18.198038 kubelet[1935]: I0513 06:54:18.198020 1935 reconciler.go:26] "Reconciler: start to sync state" May 13 06:54:18.200544 kubelet[1935]: I0513 06:54:18.200498 1935 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 06:54:18.205876 kubelet[1935]: I0513 06:54:18.205849 1935 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 06:54:18.205976 kubelet[1935]: I0513 06:54:18.205882 1935 status_manager.go:227] "Starting to sync pod status with apiserver" May 13 06:54:18.205976 kubelet[1935]: I0513 06:54:18.205904 1935 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 13 06:54:18.205976 kubelet[1935]: I0513 06:54:18.205911 1935 kubelet.go:2388] "Starting kubelet main sync loop" May 13 06:54:18.206072 kubelet[1935]: E0513 06:54:18.205974 1935 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 13 06:54:18.214902 kubelet[1935]: I0513 06:54:18.214878 1935 factory.go:221] Registration of the systemd container factory successfully May 13 06:54:18.215893 kubelet[1935]: I0513 06:54:18.215035 1935 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 06:54:18.216745 kubelet[1935]: I0513 06:54:18.216727 1935 factory.go:221] Registration of the containerd container factory successfully May 13 06:54:18.278202 kubelet[1935]: I0513 06:54:18.278170 1935 cpu_manager.go:221] "Starting CPU manager" policy="none" May 13 06:54:18.278202 kubelet[1935]: I0513 06:54:18.278192 1935 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 13 06:54:18.278202 kubelet[1935]: I0513 06:54:18.278209 1935 state_mem.go:36] "Initialized new in-memory state store" May 13 06:54:18.278546 kubelet[1935]: I0513 06:54:18.278499 1935 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 13 06:54:18.278583 kubelet[1935]: I0513 06:54:18.278538 1935 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 13 06:54:18.278583 kubelet[1935]: I0513 06:54:18.278560 1935 policy_none.go:49] "None policy: Start" May 13 06:54:18.278583 kubelet[1935]: I0513 06:54:18.278569 1935 memory_manager.go:186] "Starting memorymanager" policy="None" May 13 06:54:18.278583 kubelet[1935]: I0513 06:54:18.278579 1935 state_mem.go:35] "Initializing new in-memory state store" May 13 06:54:18.282333 kubelet[1935]: I0513 06:54:18.280191 1935 state_mem.go:75] "Updated machine memory state" May 13 06:54:18.289095 kubelet[1935]: I0513 06:54:18.289054 1935 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 06:54:18.288000 audit[1935]: AVC avc: denied { mac_admin } for pid=1935 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:18.288000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 06:54:18.288000 audit[1935]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004947b0 a1=c0009b2f78 a2=c000494750 a3=25 items=0 ppid=1 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:18.288000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 06:54:18.289429 kubelet[1935]: I0513 06:54:18.289133 1935 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 13 06:54:18.289429 kubelet[1935]: I0513 06:54:18.289286 1935 eviction_manager.go:189] "Eviction manager: starting control loop" May 13 06:54:18.289429 kubelet[1935]: I0513 06:54:18.289298 1935 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 06:54:18.291200 kubelet[1935]: I0513 06:54:18.290066 1935 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 06:54:18.294364 kubelet[1935]: E0513 06:54:18.294333 1935 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 13 06:54:18.306775 kubelet[1935]: I0513 06:54:18.306728 1935 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:18.309562 kubelet[1935]: I0513 06:54:18.309538 1935 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:18.311559 kubelet[1935]: I0513 06:54:18.311544 1935 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:18.314310 kubelet[1935]: W0513 06:54:18.314284 1935 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 13 06:54:18.325496 kubelet[1935]: W0513 06:54:18.324440 1935 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 13 06:54:18.325823 kubelet[1935]: W0513 06:54:18.324510 1935 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 13 06:54:18.326201 kubelet[1935]: E0513 06:54:18.326157 1935 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal\" already exists" pod="kube-system/kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:18.396103 kubelet[1935]: I0513 06:54:18.396034 1935 kubelet_node_status.go:76] "Attempting to register node" node="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:18.423841 kubelet[1935]: I0513 06:54:18.420860 1935 kubelet_node_status.go:125] "Node was previously registered" node="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:18.423841 kubelet[1935]: I0513 06:54:18.421101 1935 kubelet_node_status.go:79] "Successfully registered node" node="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:18.499561 kubelet[1935]: I0513 06:54:18.499396 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a141f550a1d6fc66b92649056a11858c-kubeconfig\") pod \"kube-scheduler-ci-3510-3-7-n-7f05b50207.novalocal\" (UID: \"a141f550a1d6fc66b92649056a11858c\") " pod="kube-system/kube-scheduler-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:18.500114 kubelet[1935]: I0513 06:54:18.500018 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/dfe1d6db0df1811146821f3639128d15-ca-certs\") pod \"kube-apiserver-ci-3510-3-7-n-7f05b50207.novalocal\" (UID: \"dfe1d6db0df1811146821f3639128d15\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:18.500609 kubelet[1935]: I0513 06:54:18.500457 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/dfe1d6db0df1811146821f3639128d15-k8s-certs\") pod \"kube-apiserver-ci-3510-3-7-n-7f05b50207.novalocal\" (UID: \"dfe1d6db0df1811146821f3639128d15\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:18.500896 kubelet[1935]: I0513 06:54:18.500861 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e18186c4ba8c102f107479194aede059-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal\" (UID: \"e18186c4ba8c102f107479194aede059\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:18.501301 kubelet[1935]: I0513 06:54:18.501240 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e18186c4ba8c102f107479194aede059-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal\" (UID: \"e18186c4ba8c102f107479194aede059\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:18.501648 kubelet[1935]: I0513 06:54:18.501585 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e18186c4ba8c102f107479194aede059-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal\" (UID: \"e18186c4ba8c102f107479194aede059\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:18.502071 kubelet[1935]: I0513 06:54:18.502006 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/dfe1d6db0df1811146821f3639128d15-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-7-n-7f05b50207.novalocal\" (UID: \"dfe1d6db0df1811146821f3639128d15\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:18.502463 kubelet[1935]: I0513 06:54:18.502349 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e18186c4ba8c102f107479194aede059-ca-certs\") pod \"kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal\" (UID: \"e18186c4ba8c102f107479194aede059\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:18.502774 kubelet[1935]: I0513 06:54:18.502736 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/e18186c4ba8c102f107479194aede059-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal\" (UID: \"e18186c4ba8c102f107479194aede059\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:19.176122 kubelet[1935]: I0513 06:54:19.176078 1935 apiserver.go:52] "Watching apiserver" May 13 06:54:19.198516 kubelet[1935]: I0513 06:54:19.198489 1935 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 13 06:54:19.252516 kubelet[1935]: I0513 06:54:19.252496 1935 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:19.252715 kubelet[1935]: I0513 06:54:19.252689 1935 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:19.262431 kubelet[1935]: W0513 06:54:19.262403 1935 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 13 06:54:19.262666 kubelet[1935]: E0513 06:54:19.262649 1935 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-ci-3510-3-7-n-7f05b50207.novalocal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:19.289643 kubelet[1935]: W0513 06:54:19.289604 1935 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 13 06:54:19.289771 kubelet[1935]: E0513 06:54:19.289663 1935 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-ci-3510-3-7-n-7f05b50207.novalocal\" already exists" pod="kube-system/kube-scheduler-ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:54:19.328160 kubelet[1935]: I0513 06:54:19.328081 1935 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-7-n-7f05b50207.novalocal" podStartSLOduration=1.328063621 podStartE2EDuration="1.328063621s" podCreationTimestamp="2025-05-13 06:54:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 06:54:19.308294655 +0000 UTC m=+1.235672048" watchObservedRunningTime="2025-05-13 06:54:19.328063621 +0000 UTC m=+1.255441014" May 13 06:54:19.342963 kubelet[1935]: I0513 06:54:19.342884 1935 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-7-n-7f05b50207.novalocal" podStartSLOduration=1.342868939 podStartE2EDuration="1.342868939s" podCreationTimestamp="2025-05-13 06:54:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 06:54:19.328325451 +0000 UTC m=+1.255702844" watchObservedRunningTime="2025-05-13 06:54:19.342868939 +0000 UTC m=+1.270246332" May 13 06:54:19.354956 kubelet[1935]: I0513 06:54:19.354626 1935 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-7-n-7f05b50207.novalocal" podStartSLOduration=2.354608517 podStartE2EDuration="2.354608517s" podCreationTimestamp="2025-05-13 06:54:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 06:54:19.343648078 +0000 UTC m=+1.271025481" watchObservedRunningTime="2025-05-13 06:54:19.354608517 +0000 UTC m=+1.281985921" May 13 06:54:20.916000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 13 06:54:20.916000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0007c0ec0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:54:20.916000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:54:23.677212 kernel: kauditd_printk_skb: 253 callbacks suppressed May 13 06:54:23.677475 kernel: audit: type=1400 audit(1747119263.658:742): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:54:23.658000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:54:23.696891 kernel: audit: type=1300 audit(1747119263.658:742): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000140700 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:54:23.658000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000140700 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:54:23.658000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:54:23.727090 kernel: audit: type=1327 audit(1747119263.658:742): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:54:23.727179 kernel: audit: type=1400 audit(1747119263.659:743): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:54:23.659000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:54:23.736263 kernel: audit: type=1300 audit(1747119263.659:743): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000140a40 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:54:23.659000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000140a40 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:54:23.743041 kernel: audit: type=1327 audit(1747119263.659:743): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:54:23.659000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:54:23.749073 kernel: audit: type=1400 audit(1747119263.661:744): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:54:23.661000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:54:23.757265 kernel: audit: type=1300 audit(1747119263.661:744): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000140c00 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:54:23.661000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000140c00 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:54:23.764077 kernel: audit: type=1327 audit(1747119263.661:744): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:54:23.661000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:54:23.770549 kernel: audit: type=1400 audit(1747119263.666:745): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:54:23.666000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:54:23.666000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000140dc0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:54:23.666000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:54:23.859569 kubelet[1935]: I0513 06:54:23.859526 1935 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 13 06:54:23.860055 env[1155]: time="2025-05-13T06:54:23.859902722Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 13 06:54:23.860253 kubelet[1935]: I0513 06:54:23.860135 1935 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 13 06:54:24.795031 sudo[1320]: pam_unix(sudo:session): session closed for user root May 13 06:54:24.794000 audit[1320]: USER_END pid=1320 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 06:54:24.794000 audit[1320]: CRED_DISP pid=1320 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 06:54:24.837477 systemd[1]: Created slice kubepods-besteffort-pod80ec3e76_c092_4c8a_adf3_db8f30182195.slice. May 13 06:54:24.841594 kubelet[1935]: I0513 06:54:24.841556 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/80ec3e76-c092-4c8a-adf3-db8f30182195-kube-proxy\") pod \"kube-proxy-fjs42\" (UID: \"80ec3e76-c092-4c8a-adf3-db8f30182195\") " pod="kube-system/kube-proxy-fjs42" May 13 06:54:24.841803 kubelet[1935]: I0513 06:54:24.841787 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/80ec3e76-c092-4c8a-adf3-db8f30182195-xtables-lock\") pod \"kube-proxy-fjs42\" (UID: \"80ec3e76-c092-4c8a-adf3-db8f30182195\") " pod="kube-system/kube-proxy-fjs42" May 13 06:54:24.841896 kubelet[1935]: I0513 06:54:24.841881 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/80ec3e76-c092-4c8a-adf3-db8f30182195-lib-modules\") pod \"kube-proxy-fjs42\" (UID: \"80ec3e76-c092-4c8a-adf3-db8f30182195\") " pod="kube-system/kube-proxy-fjs42" May 13 06:54:24.842050 kubelet[1935]: I0513 06:54:24.842030 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kldb8\" (UniqueName: \"kubernetes.io/projected/80ec3e76-c092-4c8a-adf3-db8f30182195-kube-api-access-kldb8\") pod \"kube-proxy-fjs42\" (UID: \"80ec3e76-c092-4c8a-adf3-db8f30182195\") " pod="kube-system/kube-proxy-fjs42" May 13 06:54:24.907988 systemd[1]: Created slice kubepods-besteffort-pod88f430e7_603f_4fd2_95c5_e6168f8d9f9e.slice. May 13 06:54:24.943261 kubelet[1935]: I0513 06:54:24.943225 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/88f430e7-603f-4fd2-95c5-e6168f8d9f9e-var-lib-calico\") pod \"tigera-operator-789496d6f5-rq8pt\" (UID: \"88f430e7-603f-4fd2-95c5-e6168f8d9f9e\") " pod="tigera-operator/tigera-operator-789496d6f5-rq8pt" May 13 06:54:24.943703 kubelet[1935]: I0513 06:54:24.943686 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jc6df\" (UniqueName: \"kubernetes.io/projected/88f430e7-603f-4fd2-95c5-e6168f8d9f9e-kube-api-access-jc6df\") pod \"tigera-operator-789496d6f5-rq8pt\" (UID: \"88f430e7-603f-4fd2-95c5-e6168f8d9f9e\") " pod="tigera-operator/tigera-operator-789496d6f5-rq8pt" May 13 06:54:24.951332 kubelet[1935]: I0513 06:54:24.951314 1935 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 13 06:54:25.016804 sshd[1307]: pam_unix(sshd:session): session closed for user core May 13 06:54:25.017000 audit[1307]: USER_END pid=1307 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:54:25.017000 audit[1307]: CRED_DISP pid=1307 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:54:25.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.54:22-172.24.4.1:48618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:54:25.021456 systemd[1]: sshd@6-172.24.4.54:22-172.24.4.1:48618.service: Deactivated successfully. May 13 06:54:25.023111 systemd[1]: session-7.scope: Deactivated successfully. May 13 06:54:25.023397 systemd[1]: session-7.scope: Consumed 6.494s CPU time. May 13 06:54:25.024322 systemd-logind[1144]: Session 7 logged out. Waiting for processes to exit. May 13 06:54:25.025415 systemd-logind[1144]: Removed session 7. May 13 06:54:25.144823 env[1155]: time="2025-05-13T06:54:25.144673766Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fjs42,Uid:80ec3e76-c092-4c8a-adf3-db8f30182195,Namespace:kube-system,Attempt:0,}" May 13 06:54:25.187638 env[1155]: time="2025-05-13T06:54:25.187472026Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 06:54:25.187638 env[1155]: time="2025-05-13T06:54:25.187561376Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 06:54:25.188097 env[1155]: time="2025-05-13T06:54:25.187595942Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 06:54:25.188568 env[1155]: time="2025-05-13T06:54:25.188456201Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/42e974755c99bcd5c5f84097bca3ab60117d4c711c75d99c5e40771b20be17c3 pid=2017 runtime=io.containerd.runc.v2 May 13 06:54:25.211878 env[1155]: time="2025-05-13T06:54:25.211549105Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-rq8pt,Uid:88f430e7-603f-4fd2-95c5-e6168f8d9f9e,Namespace:tigera-operator,Attempt:0,}" May 13 06:54:25.240999 systemd[1]: Started cri-containerd-42e974755c99bcd5c5f84097bca3ab60117d4c711c75d99c5e40771b20be17c3.scope. May 13 06:54:25.253642 env[1155]: time="2025-05-13T06:54:25.253566417Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 06:54:25.253843 env[1155]: time="2025-05-13T06:54:25.253819440Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 06:54:25.253971 env[1155]: time="2025-05-13T06:54:25.253942654Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 06:54:25.254294 env[1155]: time="2025-05-13T06:54:25.254246493Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8410a016ffc4206f4386410b187015d7ea97aea3027e1e0bfbe4ec655bcbf7b7 pid=2049 runtime=io.containerd.runc.v2 May 13 06:54:25.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.259000 audit: BPF prog-id=103 op=LOAD May 13 06:54:25.260000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.260000 audit[2029]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2017 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432653937343735356339396263643563356638343039376263613361 May 13 06:54:25.260000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.260000 audit[2029]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2017 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432653937343735356339396263643563356638343039376263613361 May 13 06:54:25.261000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.261000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.261000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.261000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.261000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.261000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.261000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.261000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.261000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.261000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.261000 audit: BPF prog-id=104 op=LOAD May 13 06:54:25.261000 audit[2029]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032ed50 items=0 ppid=2017 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432653937343735356339396263643563356638343039376263613361 May 13 06:54:25.262000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.262000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.262000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.262000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.262000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.262000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.262000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.262000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.262000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.262000 audit: BPF prog-id=105 op=LOAD May 13 06:54:25.262000 audit[2029]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032ed98 items=0 ppid=2017 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432653937343735356339396263643563356638343039376263613361 May 13 06:54:25.262000 audit: BPF prog-id=105 op=UNLOAD May 13 06:54:25.263000 audit: BPF prog-id=104 op=UNLOAD May 13 06:54:25.263000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.263000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.263000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.263000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.263000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.263000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.263000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.263000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.263000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.263000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.263000 audit: BPF prog-id=106 op=LOAD May 13 06:54:25.263000 audit[2029]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032f1a8 items=0 ppid=2017 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432653937343735356339396263643563356638343039376263613361 May 13 06:54:25.274683 systemd[1]: Started cri-containerd-8410a016ffc4206f4386410b187015d7ea97aea3027e1e0bfbe4ec655bcbf7b7.scope. May 13 06:54:25.283360 env[1155]: time="2025-05-13T06:54:25.283268088Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fjs42,Uid:80ec3e76-c092-4c8a-adf3-db8f30182195,Namespace:kube-system,Attempt:0,} returns sandbox id \"42e974755c99bcd5c5f84097bca3ab60117d4c711c75d99c5e40771b20be17c3\"" May 13 06:54:25.289303 env[1155]: time="2025-05-13T06:54:25.289254377Z" level=info msg="CreateContainer within sandbox \"42e974755c99bcd5c5f84097bca3ab60117d4c711c75d99c5e40771b20be17c3\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 13 06:54:25.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.294000 audit: BPF prog-id=107 op=LOAD May 13 06:54:25.294000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.294000 audit[2064]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2049 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834313061303136666663343230366634333836343130623138373031 May 13 06:54:25.295000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.295000 audit[2064]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2049 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834313061303136666663343230366634333836343130623138373031 May 13 06:54:25.295000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.295000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.295000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.295000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.295000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.295000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.295000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.295000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.295000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.295000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.295000 audit: BPF prog-id=108 op=LOAD May 13 06:54:25.295000 audit[2064]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000279d90 items=0 ppid=2049 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834313061303136666663343230366634333836343130623138373031 May 13 06:54:25.296000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.296000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.296000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.296000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.296000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.296000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.296000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.296000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.296000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.296000 audit: BPF prog-id=109 op=LOAD May 13 06:54:25.296000 audit[2064]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000279dd8 items=0 ppid=2049 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834313061303136666663343230366634333836343130623138373031 May 13 06:54:25.296000 audit: BPF prog-id=109 op=UNLOAD May 13 06:54:25.296000 audit: BPF prog-id=108 op=UNLOAD May 13 06:54:25.296000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.296000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.296000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.296000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.296000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.296000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.296000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.296000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.296000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.296000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.296000 audit: BPF prog-id=110 op=LOAD May 13 06:54:25.296000 audit[2064]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ee1e8 items=0 ppid=2049 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834313061303136666663343230366634333836343130623138373031 May 13 06:54:25.314944 env[1155]: time="2025-05-13T06:54:25.314850910Z" level=info msg="CreateContainer within sandbox \"42e974755c99bcd5c5f84097bca3ab60117d4c711c75d99c5e40771b20be17c3\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"0718588698e52deb1e1aa255e7f98ca6d551feea5d80ff415b30347bcab7ebe4\"" May 13 06:54:25.316170 env[1155]: time="2025-05-13T06:54:25.316141317Z" level=info msg="StartContainer for \"0718588698e52deb1e1aa255e7f98ca6d551feea5d80ff415b30347bcab7ebe4\"" May 13 06:54:25.334484 env[1155]: time="2025-05-13T06:54:25.334441316Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-rq8pt,Uid:88f430e7-603f-4fd2-95c5-e6168f8d9f9e,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"8410a016ffc4206f4386410b187015d7ea97aea3027e1e0bfbe4ec655bcbf7b7\"" May 13 06:54:25.336562 env[1155]: time="2025-05-13T06:54:25.336538840Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 13 06:54:25.340776 systemd[1]: Started cri-containerd-0718588698e52deb1e1aa255e7f98ca6d551feea5d80ff415b30347bcab7ebe4.scope. May 13 06:54:25.365000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.365000 audit[2095]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fbd6856d7b8 items=0 ppid=2017 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037313835383836393865353264656231653161613235356537663938 May 13 06:54:25.366000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.366000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.366000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.366000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.366000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.366000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.366000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.366000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.366000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.366000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.366000 audit: BPF prog-id=111 op=LOAD May 13 06:54:25.366000 audit[2095]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000342b68 items=0 ppid=2017 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037313835383836393865353264656231653161613235356537663938 May 13 06:54:25.367000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.367000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.367000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.367000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.367000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.367000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.367000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.367000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.367000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.367000 audit: BPF prog-id=112 op=LOAD May 13 06:54:25.367000 audit[2095]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000342bb8 items=0 ppid=2017 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037313835383836393865353264656231653161613235356537663938 May 13 06:54:25.367000 audit: BPF prog-id=112 op=UNLOAD May 13 06:54:25.367000 audit: BPF prog-id=111 op=UNLOAD May 13 06:54:25.367000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.367000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.367000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.367000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.367000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.367000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.367000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.367000 audit[2095]: AVC avc: denied { perfmon } for pid=2095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.367000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.367000 audit[2095]: AVC avc: denied { bpf } for pid=2095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:25.367000 audit: BPF prog-id=113 op=LOAD May 13 06:54:25.367000 audit[2095]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000342c48 items=0 ppid=2017 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037313835383836393865353264656231653161613235356537663938 May 13 06:54:25.387383 env[1155]: time="2025-05-13T06:54:25.387342734Z" level=info msg="StartContainer for \"0718588698e52deb1e1aa255e7f98ca6d551feea5d80ff415b30347bcab7ebe4\" returns successfully" May 13 06:54:25.493000 audit[2161]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.493000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9a372990 a2=0 a3=7fff9a37297c items=0 ppid=2110 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.493000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 06:54:25.502000 audit[2162]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2162 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.502000 audit[2162]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe91f7c430 a2=0 a3=7ffe91f7c41c items=0 ppid=2110 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.502000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 06:54:25.503000 audit[2163]: NETFILTER_CFG table=mangle:40 family=2 entries=1 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:25.503000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc643e9cb0 a2=0 a3=c05dc43e768ff446 items=0 ppid=2110 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.503000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 06:54:25.504000 audit[2164]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2164 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.504000 audit[2164]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc476c380 a2=0 a3=7fffc476c36c items=0 ppid=2110 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.504000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 06:54:25.505000 audit[2165]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2165 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:25.505000 audit[2165]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff71bfcc0 a2=0 a3=7ffff71bfcac items=0 ppid=2110 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.505000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 06:54:25.506000 audit[2166]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:25.506000 audit[2166]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff333fdca0 a2=0 a3=7fff333fdc8c items=0 ppid=2110 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.506000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 06:54:25.598000 audit[2167]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:25.598000 audit[2167]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffecd25adf0 a2=0 a3=7ffecd25addc items=0 ppid=2110 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.598000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 06:54:25.605000 audit[2169]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:25.605000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc5689c8d0 a2=0 a3=7ffc5689c8bc items=0 ppid=2110 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.605000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 13 06:54:25.613000 audit[2172]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:25.613000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd7f5811f0 a2=0 a3=7ffd7f5811dc items=0 ppid=2110 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.613000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 13 06:54:25.616000 audit[2173]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2173 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:25.616000 audit[2173]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd2cc5ad60 a2=0 a3=7ffd2cc5ad4c items=0 ppid=2110 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.616000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 06:54:25.622000 audit[2175]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:25.622000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcf3b18290 a2=0 a3=7ffcf3b1827c items=0 ppid=2110 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.622000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 06:54:25.624000 audit[2176]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2176 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:25.624000 audit[2176]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6e80d260 a2=0 a3=7ffc6e80d24c items=0 ppid=2110 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.624000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 06:54:25.633000 audit[2178]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:25.633000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc4f5ab500 a2=0 a3=7ffc4f5ab4ec items=0 ppid=2110 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.633000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 06:54:25.643000 audit[2181]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:25.643000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff94be4e60 a2=0 a3=7fff94be4e4c items=0 ppid=2110 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.643000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 13 06:54:25.646000 audit[2182]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2182 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:25.646000 audit[2182]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd69b093b0 a2=0 a3=7ffd69b0939c items=0 ppid=2110 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.646000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 06:54:25.653000 audit[2184]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:25.653000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe2bc88040 a2=0 a3=7ffe2bc8802c items=0 ppid=2110 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.653000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 06:54:25.656000 audit[2185]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:25.656000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeae1ed820 a2=0 a3=7ffeae1ed80c items=0 ppid=2110 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.656000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 06:54:25.663000 audit[2187]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:25.663000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffae0b2020 a2=0 a3=7fffae0b200c items=0 ppid=2110 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.663000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 06:54:25.671000 audit[2190]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:25.671000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff0975c8b0 a2=0 a3=7fff0975c89c items=0 ppid=2110 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.671000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 06:54:25.680000 audit[2193]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:25.680000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffec2f28370 a2=0 a3=7ffec2f2835c items=0 ppid=2110 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.680000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 06:54:25.683000 audit[2194]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:25.683000 audit[2194]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe3c3e06f0 a2=0 a3=7ffe3c3e06dc items=0 ppid=2110 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.683000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 06:54:25.690000 audit[2196]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:25.690000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fff5f13a240 a2=0 a3=7fff5f13a22c items=0 ppid=2110 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.690000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 06:54:25.696000 audit[2199]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:25.696000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd90049200 a2=0 a3=7ffd900491ec items=0 ppid=2110 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.696000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 06:54:25.697000 audit[2200]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:25.697000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbcda6460 a2=0 a3=7fffbcda644c items=0 ppid=2110 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.697000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 06:54:25.701000 audit[2202]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 06:54:25.701000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff697d4170 a2=0 a3=7fff697d415c items=0 ppid=2110 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.701000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 06:54:25.745000 audit[2208]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:54:25.745000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcc844bcd0 a2=0 a3=7ffcc844bcbc items=0 ppid=2110 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.745000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:54:25.756000 audit[2208]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:54:25.756000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffcc844bcd0 a2=0 a3=7ffcc844bcbc items=0 ppid=2110 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.756000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:54:25.758000 audit[2213]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.758000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff5d6e3810 a2=0 a3=7fff5d6e37fc items=0 ppid=2110 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.758000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 06:54:25.762000 audit[2215]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.762000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcb3e28ea0 a2=0 a3=7ffcb3e28e8c items=0 ppid=2110 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.762000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 13 06:54:25.767000 audit[2218]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.767000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff076a5c90 a2=0 a3=7fff076a5c7c items=0 ppid=2110 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.767000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 13 06:54:25.768000 audit[2219]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.768000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde4373830 a2=0 a3=7ffde437381c items=0 ppid=2110 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.768000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 06:54:25.770000 audit[2221]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.770000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc42640860 a2=0 a3=7ffc4264084c items=0 ppid=2110 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.770000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 06:54:25.771000 audit[2222]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.771000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd3214ee0 a2=0 a3=7ffcd3214ecc items=0 ppid=2110 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.771000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 06:54:25.774000 audit[2224]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.774000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff67454d90 a2=0 a3=7fff67454d7c items=0 ppid=2110 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.774000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 13 06:54:25.778000 audit[2227]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.778000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffeb0608490 a2=0 a3=7ffeb060847c items=0 ppid=2110 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.778000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 06:54:25.779000 audit[2228]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.779000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff35e8b10 a2=0 a3=7ffff35e8afc items=0 ppid=2110 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.779000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 06:54:25.782000 audit[2230]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.782000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff53f742e0 a2=0 a3=7fff53f742cc items=0 ppid=2110 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.782000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 06:54:25.785000 audit[2231]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.785000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc31700040 a2=0 a3=7ffc3170002c items=0 ppid=2110 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.785000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 06:54:25.790000 audit[2233]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.790000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe6ea44680 a2=0 a3=7ffe6ea4466c items=0 ppid=2110 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.790000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 06:54:25.797000 audit[2236]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.797000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffffcf39d10 a2=0 a3=7ffffcf39cfc items=0 ppid=2110 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.797000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 06:54:25.801000 audit[2239]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.801000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe34296290 a2=0 a3=7ffe3429627c items=0 ppid=2110 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.801000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 13 06:54:25.803000 audit[2240]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.803000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdaba22cb0 a2=0 a3=7ffdaba22c9c items=0 ppid=2110 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.803000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 06:54:25.805000 audit[2242]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.805000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff39e52e00 a2=0 a3=7fff39e52dec items=0 ppid=2110 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.805000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 06:54:25.808000 audit[2245]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.808000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff87407c60 a2=0 a3=7fff87407c4c items=0 ppid=2110 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.808000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 06:54:25.809000 audit[2246]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.809000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe72aa31f0 a2=0 a3=7ffe72aa31dc items=0 ppid=2110 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.809000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 06:54:25.811000 audit[2248]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.811000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff93214800 a2=0 a3=7fff932147ec items=0 ppid=2110 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.811000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 06:54:25.812000 audit[2249]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.812000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd36904090 a2=0 a3=7ffd3690407c items=0 ppid=2110 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.812000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 06:54:25.815000 audit[2251]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.815000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff06714170 a2=0 a3=7fff0671415c items=0 ppid=2110 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.815000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 06:54:25.818000 audit[2254]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 06:54:25.818000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdb74bc360 a2=0 a3=7ffdb74bc34c items=0 ppid=2110 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.818000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 06:54:25.824000 audit[2256]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 06:54:25.824000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffc4c20b3c0 a2=0 a3=7ffc4c20b3ac items=0 ppid=2110 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.824000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:54:25.825000 audit[2256]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 06:54:25.825000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc4c20b3c0 a2=0 a3=7ffc4c20b3ac items=0 ppid=2110 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:25.825000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:54:27.150089 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1071742963.mount: Deactivated successfully. May 13 06:54:28.218148 env[1155]: time="2025-05-13T06:54:28.218046907Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:28.221209 env[1155]: time="2025-05-13T06:54:28.221174985Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:28.224183 env[1155]: time="2025-05-13T06:54:28.224163779Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:28.227314 env[1155]: time="2025-05-13T06:54:28.227250318Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:28.227972 env[1155]: time="2025-05-13T06:54:28.227945851Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 13 06:54:28.233581 env[1155]: time="2025-05-13T06:54:28.233551891Z" level=info msg="CreateContainer within sandbox \"8410a016ffc4206f4386410b187015d7ea97aea3027e1e0bfbe4ec655bcbf7b7\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 13 06:54:28.263359 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1243298906.mount: Deactivated successfully. May 13 06:54:28.264477 env[1155]: time="2025-05-13T06:54:28.264443516Z" level=info msg="CreateContainer within sandbox \"8410a016ffc4206f4386410b187015d7ea97aea3027e1e0bfbe4ec655bcbf7b7\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"27e12d200e9280d355597840352486d3bf948e322f9c1b41f5de4fac4a90091c\"" May 13 06:54:28.265404 env[1155]: time="2025-05-13T06:54:28.265381519Z" level=info msg="StartContainer for \"27e12d200e9280d355597840352486d3bf948e322f9c1b41f5de4fac4a90091c\"" May 13 06:54:28.303291 systemd[1]: Started cri-containerd-27e12d200e9280d355597840352486d3bf948e322f9c1b41f5de4fac4a90091c.scope. May 13 06:54:28.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit: BPF prog-id=114 op=LOAD May 13 06:54:28.317000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2049 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:28.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237653132643230306539323830643335353539373834303335323438 May 13 06:54:28.317000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2049 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:28.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237653132643230306539323830643335353539373834303335323438 May 13 06:54:28.317000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit: BPF prog-id=115 op=LOAD May 13 06:54:28.317000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000396f50 items=0 ppid=2049 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:28.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237653132643230306539323830643335353539373834303335323438 May 13 06:54:28.317000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.317000 audit: BPF prog-id=116 op=LOAD May 13 06:54:28.317000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000396f98 items=0 ppid=2049 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:28.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237653132643230306539323830643335353539373834303335323438 May 13 06:54:28.318000 audit: BPF prog-id=116 op=UNLOAD May 13 06:54:28.318000 audit: BPF prog-id=115 op=UNLOAD May 13 06:54:28.318000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.318000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.318000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.318000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.318000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.318000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.318000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.318000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.318000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.318000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:28.318000 audit: BPF prog-id=117 op=LOAD May 13 06:54:28.318000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003973a8 items=0 ppid=2049 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:28.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237653132643230306539323830643335353539373834303335323438 May 13 06:54:28.348983 env[1155]: time="2025-05-13T06:54:28.348901775Z" level=info msg="StartContainer for \"27e12d200e9280d355597840352486d3bf948e322f9c1b41f5de4fac4a90091c\" returns successfully" May 13 06:54:29.320515 kubelet[1935]: I0513 06:54:29.320422 1935 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-fjs42" podStartSLOduration=5.3203928 podStartE2EDuration="5.3203928s" podCreationTimestamp="2025-05-13 06:54:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 06:54:26.298966902 +0000 UTC m=+8.226344345" watchObservedRunningTime="2025-05-13 06:54:29.3203928 +0000 UTC m=+11.247770244" May 13 06:54:29.823247 kubelet[1935]: I0513 06:54:29.823145 1935 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-789496d6f5-rq8pt" podStartSLOduration=2.928072786 podStartE2EDuration="5.823113007s" podCreationTimestamp="2025-05-13 06:54:24 +0000 UTC" firstStartedPulling="2025-05-13 06:54:25.335996778 +0000 UTC m=+7.263374171" lastFinishedPulling="2025-05-13 06:54:28.231036999 +0000 UTC m=+10.158414392" observedRunningTime="2025-05-13 06:54:29.323690619 +0000 UTC m=+11.251068062" watchObservedRunningTime="2025-05-13 06:54:29.823113007 +0000 UTC m=+11.750490450" May 13 06:54:31.542000 audit[2299]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:54:31.544721 kernel: kauditd_printk_skb: 374 callbacks suppressed May 13 06:54:31.544774 kernel: audit: type=1325 audit(1747119271.542:862): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:54:31.542000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcf2a443a0 a2=0 a3=7ffcf2a4438c items=0 ppid=2110 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:31.542000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:54:31.562402 kernel: audit: type=1300 audit(1747119271.542:862): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcf2a443a0 a2=0 a3=7ffcf2a4438c items=0 ppid=2110 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:31.562471 kernel: audit: type=1327 audit(1747119271.542:862): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:54:31.563000 audit[2299]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:54:31.568981 kernel: audit: type=1325 audit(1747119271.563:863): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:54:31.563000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcf2a443a0 a2=0 a3=0 items=0 ppid=2110 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:31.563000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:54:31.579979 kernel: audit: type=1300 audit(1747119271.563:863): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcf2a443a0 a2=0 a3=0 items=0 ppid=2110 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:31.580061 kernel: audit: type=1327 audit(1747119271.563:863): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:54:31.659000 audit[2301]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:54:31.659000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff138a4750 a2=0 a3=7fff138a473c items=0 ppid=2110 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:31.671810 kernel: audit: type=1325 audit(1747119271.659:864): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:54:31.671868 kernel: audit: type=1300 audit(1747119271.659:864): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff138a4750 a2=0 a3=7fff138a473c items=0 ppid=2110 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:31.671888 kernel: audit: type=1327 audit(1747119271.659:864): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:54:31.659000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:54:31.683000 audit[2301]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:54:31.683000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff138a4750 a2=0 a3=0 items=0 ppid=2110 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:31.683000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:54:31.688954 kernel: audit: type=1325 audit(1747119271.683:865): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:54:31.810655 systemd[1]: Created slice kubepods-besteffort-pod4af1dbe8_fdce_4649_9009_84e25d397b32.slice. May 13 06:54:31.888754 kubelet[1935]: I0513 06:54:31.888712 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xqmsm\" (UniqueName: \"kubernetes.io/projected/4af1dbe8-fdce-4649-9009-84e25d397b32-kube-api-access-xqmsm\") pod \"calico-typha-85bc846576-q826b\" (UID: \"4af1dbe8-fdce-4649-9009-84e25d397b32\") " pod="calico-system/calico-typha-85bc846576-q826b" May 13 06:54:31.889291 kubelet[1935]: I0513 06:54:31.889263 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/4af1dbe8-fdce-4649-9009-84e25d397b32-typha-certs\") pod \"calico-typha-85bc846576-q826b\" (UID: \"4af1dbe8-fdce-4649-9009-84e25d397b32\") " pod="calico-system/calico-typha-85bc846576-q826b" May 13 06:54:31.889443 kubelet[1935]: I0513 06:54:31.889425 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4af1dbe8-fdce-4649-9009-84e25d397b32-tigera-ca-bundle\") pod \"calico-typha-85bc846576-q826b\" (UID: \"4af1dbe8-fdce-4649-9009-84e25d397b32\") " pod="calico-system/calico-typha-85bc846576-q826b" May 13 06:54:31.934256 systemd[1]: Created slice kubepods-besteffort-podc92e971b_9e06_4663_88bb_6baef3cbe71a.slice. May 13 06:54:31.990353 kubelet[1935]: I0513 06:54:31.990320 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-cni-log-dir\") pod \"calico-node-pnrj8\" (UID: \"c92e971b-9e06-4663-88bb-6baef3cbe71a\") " pod="calico-system/calico-node-pnrj8" May 13 06:54:31.990590 kubelet[1935]: I0513 06:54:31.990574 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/c92e971b-9e06-4663-88bb-6baef3cbe71a-node-certs\") pod \"calico-node-pnrj8\" (UID: \"c92e971b-9e06-4663-88bb-6baef3cbe71a\") " pod="calico-system/calico-node-pnrj8" May 13 06:54:31.990702 kubelet[1935]: I0513 06:54:31.990687 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-lib-modules\") pod \"calico-node-pnrj8\" (UID: \"c92e971b-9e06-4663-88bb-6baef3cbe71a\") " pod="calico-system/calico-node-pnrj8" May 13 06:54:31.990786 kubelet[1935]: I0513 06:54:31.990772 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-xtables-lock\") pod \"calico-node-pnrj8\" (UID: \"c92e971b-9e06-4663-88bb-6baef3cbe71a\") " pod="calico-system/calico-node-pnrj8" May 13 06:54:31.990863 kubelet[1935]: I0513 06:54:31.990850 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q5d5l\" (UniqueName: \"kubernetes.io/projected/c92e971b-9e06-4663-88bb-6baef3cbe71a-kube-api-access-q5d5l\") pod \"calico-node-pnrj8\" (UID: \"c92e971b-9e06-4663-88bb-6baef3cbe71a\") " pod="calico-system/calico-node-pnrj8" May 13 06:54:31.990959 kubelet[1935]: I0513 06:54:31.990943 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-policysync\") pod \"calico-node-pnrj8\" (UID: \"c92e971b-9e06-4663-88bb-6baef3cbe71a\") " pod="calico-system/calico-node-pnrj8" May 13 06:54:31.991063 kubelet[1935]: I0513 06:54:31.991047 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-var-lib-calico\") pod \"calico-node-pnrj8\" (UID: \"c92e971b-9e06-4663-88bb-6baef3cbe71a\") " pod="calico-system/calico-node-pnrj8" May 13 06:54:31.991144 kubelet[1935]: I0513 06:54:31.991131 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-cni-net-dir\") pod \"calico-node-pnrj8\" (UID: \"c92e971b-9e06-4663-88bb-6baef3cbe71a\") " pod="calico-system/calico-node-pnrj8" May 13 06:54:31.991237 kubelet[1935]: I0513 06:54:31.991223 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-var-run-calico\") pod \"calico-node-pnrj8\" (UID: \"c92e971b-9e06-4663-88bb-6baef3cbe71a\") " pod="calico-system/calico-node-pnrj8" May 13 06:54:31.991414 kubelet[1935]: I0513 06:54:31.991397 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-cni-bin-dir\") pod \"calico-node-pnrj8\" (UID: \"c92e971b-9e06-4663-88bb-6baef3cbe71a\") " pod="calico-system/calico-node-pnrj8" May 13 06:54:31.991498 kubelet[1935]: I0513 06:54:31.991484 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-flexvol-driver-host\") pod \"calico-node-pnrj8\" (UID: \"c92e971b-9e06-4663-88bb-6baef3cbe71a\") " pod="calico-system/calico-node-pnrj8" May 13 06:54:31.991583 kubelet[1935]: I0513 06:54:31.991568 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c92e971b-9e06-4663-88bb-6baef3cbe71a-tigera-ca-bundle\") pod \"calico-node-pnrj8\" (UID: \"c92e971b-9e06-4663-88bb-6baef3cbe71a\") " pod="calico-system/calico-node-pnrj8" May 13 06:54:32.056033 kubelet[1935]: E0513 06:54:32.055992 1935 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8fghh" podUID="f8774101-e6a2-4977-be65-5647d581d80d" May 13 06:54:32.092262 kubelet[1935]: I0513 06:54:32.092151 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/f8774101-e6a2-4977-be65-5647d581d80d-varrun\") pod \"csi-node-driver-8fghh\" (UID: \"f8774101-e6a2-4977-be65-5647d581d80d\") " pod="calico-system/csi-node-driver-8fghh" May 13 06:54:32.092517 kubelet[1935]: I0513 06:54:32.092501 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/f8774101-e6a2-4977-be65-5647d581d80d-socket-dir\") pod \"csi-node-driver-8fghh\" (UID: \"f8774101-e6a2-4977-be65-5647d581d80d\") " pod="calico-system/csi-node-driver-8fghh" May 13 06:54:32.092618 kubelet[1935]: I0513 06:54:32.092604 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/f8774101-e6a2-4977-be65-5647d581d80d-registration-dir\") pod \"csi-node-driver-8fghh\" (UID: \"f8774101-e6a2-4977-be65-5647d581d80d\") " pod="calico-system/csi-node-driver-8fghh" May 13 06:54:32.092725 kubelet[1935]: I0513 06:54:32.092711 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wzlxv\" (UniqueName: \"kubernetes.io/projected/f8774101-e6a2-4977-be65-5647d581d80d-kube-api-access-wzlxv\") pod \"csi-node-driver-8fghh\" (UID: \"f8774101-e6a2-4977-be65-5647d581d80d\") " pod="calico-system/csi-node-driver-8fghh" May 13 06:54:32.092812 kubelet[1935]: I0513 06:54:32.092798 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/f8774101-e6a2-4977-be65-5647d581d80d-kubelet-dir\") pod \"csi-node-driver-8fghh\" (UID: \"f8774101-e6a2-4977-be65-5647d581d80d\") " pod="calico-system/csi-node-driver-8fghh" May 13 06:54:32.107540 kubelet[1935]: E0513 06:54:32.106456 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.107540 kubelet[1935]: W0513 06:54:32.106476 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.107540 kubelet[1935]: E0513 06:54:32.106497 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.117929 env[1155]: time="2025-05-13T06:54:32.117382394Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-85bc846576-q826b,Uid:4af1dbe8-fdce-4649-9009-84e25d397b32,Namespace:calico-system,Attempt:0,}" May 13 06:54:32.133860 kubelet[1935]: E0513 06:54:32.133837 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.134023 kubelet[1935]: W0513 06:54:32.134008 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.134110 kubelet[1935]: E0513 06:54:32.134097 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.151675 env[1155]: time="2025-05-13T06:54:32.151599567Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 06:54:32.151854 env[1155]: time="2025-05-13T06:54:32.151641316Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 06:54:32.151854 env[1155]: time="2025-05-13T06:54:32.151675040Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 06:54:32.151948 env[1155]: time="2025-05-13T06:54:32.151847347Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d49f46d7ff5366d535ed829232c20e3ee4f3c942fe48d2f6875c6d1390fc553a pid=2315 runtime=io.containerd.runc.v2 May 13 06:54:32.195195 kubelet[1935]: E0513 06:54:32.194547 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.195195 kubelet[1935]: W0513 06:54:32.194571 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.195195 kubelet[1935]: E0513 06:54:32.194589 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.195720 kubelet[1935]: E0513 06:54:32.195445 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.195720 kubelet[1935]: W0513 06:54:32.195457 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.195720 kubelet[1935]: E0513 06:54:32.195476 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.195720 kubelet[1935]: E0513 06:54:32.195654 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.195720 kubelet[1935]: W0513 06:54:32.195662 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.195720 kubelet[1935]: E0513 06:54:32.195676 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.197195 kubelet[1935]: E0513 06:54:32.196080 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.197195 kubelet[1935]: W0513 06:54:32.196107 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.197195 kubelet[1935]: E0513 06:54:32.196131 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.197474 kubelet[1935]: E0513 06:54:32.197452 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.197474 kubelet[1935]: W0513 06:54:32.197467 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.197646 kubelet[1935]: E0513 06:54:32.197561 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.197691 kubelet[1935]: E0513 06:54:32.197674 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.197691 kubelet[1935]: W0513 06:54:32.197683 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.197833 kubelet[1935]: E0513 06:54:32.197801 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.197885 kubelet[1935]: E0513 06:54:32.197875 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.197965 kubelet[1935]: W0513 06:54:32.197885 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.197965 kubelet[1935]: E0513 06:54:32.197944 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.198181 kubelet[1935]: E0513 06:54:32.198165 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.198181 kubelet[1935]: W0513 06:54:32.198178 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.199801 kubelet[1935]: E0513 06:54:32.199631 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.199801 kubelet[1935]: E0513 06:54:32.199766 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.199801 kubelet[1935]: W0513 06:54:32.199775 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.199801 kubelet[1935]: E0513 06:54:32.199790 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.200204 kubelet[1935]: E0513 06:54:32.200079 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.200204 kubelet[1935]: W0513 06:54:32.200094 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.200204 kubelet[1935]: E0513 06:54:32.200105 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.200740 kubelet[1935]: E0513 06:54:32.200724 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.200740 kubelet[1935]: W0513 06:54:32.200737 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.200834 kubelet[1935]: E0513 06:54:32.200751 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.201010 kubelet[1935]: E0513 06:54:32.200960 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.201010 kubelet[1935]: W0513 06:54:32.200973 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.201010 kubelet[1935]: E0513 06:54:32.200984 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.202848 kubelet[1935]: E0513 06:54:32.201154 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.202848 kubelet[1935]: W0513 06:54:32.201169 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.202848 kubelet[1935]: E0513 06:54:32.201296 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.202848 kubelet[1935]: W0513 06:54:32.201305 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.203546 kubelet[1935]: E0513 06:54:32.203171 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.203546 kubelet[1935]: E0513 06:54:32.203404 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.203622 kubelet[1935]: E0513 06:54:32.203599 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.203622 kubelet[1935]: W0513 06:54:32.203612 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.203783 kubelet[1935]: E0513 06:54:32.203713 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.205159 kubelet[1935]: E0513 06:54:32.205059 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.205159 kubelet[1935]: W0513 06:54:32.205073 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.205897 kubelet[1935]: E0513 06:54:32.205143 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.206128 kubelet[1935]: E0513 06:54:32.206027 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.206128 kubelet[1935]: W0513 06:54:32.206041 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.208936 kubelet[1935]: E0513 06:54:32.207432 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.208936 kubelet[1935]: W0513 06:54:32.207446 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.208936 kubelet[1935]: E0513 06:54:32.207584 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.208936 kubelet[1935]: W0513 06:54:32.207592 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.208936 kubelet[1935]: E0513 06:54:32.207603 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.209339 kubelet[1935]: E0513 06:54:32.209323 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.209427 kubelet[1935]: E0513 06:54:32.209415 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.209909 systemd[1]: Started cri-containerd-d49f46d7ff5366d535ed829232c20e3ee4f3c942fe48d2f6875c6d1390fc553a.scope. May 13 06:54:32.210295 kubelet[1935]: E0513 06:54:32.210223 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.210295 kubelet[1935]: W0513 06:54:32.210250 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.210295 kubelet[1935]: E0513 06:54:32.210265 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.210471 kubelet[1935]: E0513 06:54:32.210440 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.210471 kubelet[1935]: W0513 06:54:32.210454 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.210471 kubelet[1935]: E0513 06:54:32.210463 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.210703 kubelet[1935]: E0513 06:54:32.210579 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.210703 kubelet[1935]: W0513 06:54:32.210592 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.210703 kubelet[1935]: E0513 06:54:32.210601 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.210928 kubelet[1935]: E0513 06:54:32.210853 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.210928 kubelet[1935]: W0513 06:54:32.210868 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.210928 kubelet[1935]: E0513 06:54:32.210877 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.211114 kubelet[1935]: E0513 06:54:32.211060 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.211114 kubelet[1935]: W0513 06:54:32.211073 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.211114 kubelet[1935]: E0513 06:54:32.211083 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.211234 kubelet[1935]: E0513 06:54:32.211220 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.211234 kubelet[1935]: W0513 06:54:32.211228 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.211293 kubelet[1935]: E0513 06:54:32.211238 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.232000 audit: BPF prog-id=118 op=LOAD May 13 06:54:32.235853 kubelet[1935]: E0513 06:54:32.234469 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:32.235853 kubelet[1935]: W0513 06:54:32.234485 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:32.235853 kubelet[1935]: E0513 06:54:32.234501 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:32.234000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2315 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:32.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434396634366437666635333636643533356564383239323332633230 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2315 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:32.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434396634366437666635333636643533356564383239323332633230 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit: BPF prog-id=119 op=LOAD May 13 06:54:32.234000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00031fd60 items=0 ppid=2315 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:32.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434396634366437666635333636643533356564383239323332633230 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit: BPF prog-id=120 op=LOAD May 13 06:54:32.234000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00031fda8 items=0 ppid=2315 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:32.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434396634366437666635333636643533356564383239323332633230 May 13 06:54:32.234000 audit: BPF prog-id=120 op=UNLOAD May 13 06:54:32.234000 audit: BPF prog-id=119 op=UNLOAD May 13 06:54:32.234000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.234000 audit: BPF prog-id=121 op=LOAD May 13 06:54:32.234000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003881b8 items=0 ppid=2315 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:32.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434396634366437666635333636643533356564383239323332633230 May 13 06:54:32.241889 env[1155]: time="2025-05-13T06:54:32.241857031Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pnrj8,Uid:c92e971b-9e06-4663-88bb-6baef3cbe71a,Namespace:calico-system,Attempt:0,}" May 13 06:54:32.267801 env[1155]: time="2025-05-13T06:54:32.267761659Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-85bc846576-q826b,Uid:4af1dbe8-fdce-4649-9009-84e25d397b32,Namespace:calico-system,Attempt:0,} returns sandbox id \"d49f46d7ff5366d535ed829232c20e3ee4f3c942fe48d2f6875c6d1390fc553a\"" May 13 06:54:32.269532 env[1155]: time="2025-05-13T06:54:32.269511582Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 13 06:54:32.274150 env[1155]: time="2025-05-13T06:54:32.274094745Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 06:54:32.274258 env[1155]: time="2025-05-13T06:54:32.274139850Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 06:54:32.274258 env[1155]: time="2025-05-13T06:54:32.274159258Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 06:54:32.274668 env[1155]: time="2025-05-13T06:54:32.274631004Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/51343e923587e69c5873f41cfd42af9a536d33902f9ba35828ea33ee017b0eeb pid=2384 runtime=io.containerd.runc.v2 May 13 06:54:32.292386 systemd[1]: Started cri-containerd-51343e923587e69c5873f41cfd42af9a536d33902f9ba35828ea33ee017b0eeb.scope. May 13 06:54:32.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.309000 audit: BPF prog-id=122 op=LOAD May 13 06:54:32.310000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.310000 audit[2395]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2384 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:32.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531333433653932333538376536396335383733663431636664343261 May 13 06:54:32.310000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.310000 audit[2395]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2384 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:32.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531333433653932333538376536396335383733663431636664343261 May 13 06:54:32.310000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.310000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.310000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.310000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.310000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.310000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.310000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.310000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.310000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.310000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.310000 audit: BPF prog-id=123 op=LOAD May 13 06:54:32.310000 audit[2395]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000210f50 items=0 ppid=2384 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:32.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531333433653932333538376536396335383733663431636664343261 May 13 06:54:32.311000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.311000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.311000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.311000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.311000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.311000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.311000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.311000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.311000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.311000 audit: BPF prog-id=124 op=LOAD May 13 06:54:32.311000 audit[2395]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000210f98 items=0 ppid=2384 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:32.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531333433653932333538376536396335383733663431636664343261 May 13 06:54:32.311000 audit: BPF prog-id=124 op=UNLOAD May 13 06:54:32.311000 audit: BPF prog-id=123 op=UNLOAD May 13 06:54:32.312000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.312000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.312000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.312000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.312000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.312000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.312000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.312000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.312000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.312000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:32.312000 audit: BPF prog-id=125 op=LOAD May 13 06:54:32.312000 audit[2395]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002113a8 items=0 ppid=2384 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:32.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531333433653932333538376536396335383733663431636664343261 May 13 06:54:32.324874 env[1155]: time="2025-05-13T06:54:32.324821046Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pnrj8,Uid:c92e971b-9e06-4663-88bb-6baef3cbe71a,Namespace:calico-system,Attempt:0,} returns sandbox id \"51343e923587e69c5873f41cfd42af9a536d33902f9ba35828ea33ee017b0eeb\"" May 13 06:54:32.696000 audit[2420]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2420 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:54:32.696000 audit[2420]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffdf6e02e30 a2=0 a3=7ffdf6e02e1c items=0 ppid=2110 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:32.696000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:54:32.702000 audit[2420]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2420 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:54:32.702000 audit[2420]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdf6e02e30 a2=0 a3=0 items=0 ppid=2110 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:32.702000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:54:34.206599 kubelet[1935]: E0513 06:54:34.206530 1935 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8fghh" podUID="f8774101-e6a2-4977-be65-5647d581d80d" May 13 06:54:35.866213 env[1155]: time="2025-05-13T06:54:35.866173885Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:35.870359 env[1155]: time="2025-05-13T06:54:35.870298690Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:35.872842 env[1155]: time="2025-05-13T06:54:35.872796920Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:35.875612 env[1155]: time="2025-05-13T06:54:35.875577715Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:35.877139 env[1155]: time="2025-05-13T06:54:35.877092048Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 13 06:54:35.887608 env[1155]: time="2025-05-13T06:54:35.887579664Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 13 06:54:35.894550 env[1155]: time="2025-05-13T06:54:35.894515433Z" level=info msg="CreateContainer within sandbox \"d49f46d7ff5366d535ed829232c20e3ee4f3c942fe48d2f6875c6d1390fc553a\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 13 06:54:35.917045 env[1155]: time="2025-05-13T06:54:35.916956548Z" level=info msg="CreateContainer within sandbox \"d49f46d7ff5366d535ed829232c20e3ee4f3c942fe48d2f6875c6d1390fc553a\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"0cd8c6ed746f64e76e3966929c35a2da375256f0dba343c0e4dd04894bae932e\"" May 13 06:54:35.917791 env[1155]: time="2025-05-13T06:54:35.917766795Z" level=info msg="StartContainer for \"0cd8c6ed746f64e76e3966929c35a2da375256f0dba343c0e4dd04894bae932e\"" May 13 06:54:35.949863 systemd[1]: Started cri-containerd-0cd8c6ed746f64e76e3966929c35a2da375256f0dba343c0e4dd04894bae932e.scope. May 13 06:54:35.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.979000 audit: BPF prog-id=126 op=LOAD May 13 06:54:35.979000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.979000 audit[2432]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2315 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:35.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063643863366564373436663634653736653339363639323963333561 May 13 06:54:35.979000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.979000 audit[2432]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=2315 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:35.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063643863366564373436663634653736653339363639323963333561 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit: BPF prog-id=127 op=LOAD May 13 06:54:35.980000 audit[2432]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000247a70 items=0 ppid=2315 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:35.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063643863366564373436663634653736653339363639323963333561 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit: BPF prog-id=128 op=LOAD May 13 06:54:35.980000 audit[2432]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000247ab8 items=0 ppid=2315 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:35.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063643863366564373436663634653736653339363639323963333561 May 13 06:54:35.980000 audit: BPF prog-id=128 op=UNLOAD May 13 06:54:35.980000 audit: BPF prog-id=127 op=UNLOAD May 13 06:54:35.980000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:35.980000 audit: BPF prog-id=129 op=LOAD May 13 06:54:35.980000 audit[2432]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000247ec8 items=0 ppid=2315 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:35.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063643863366564373436663634653736653339363639323963333561 May 13 06:54:36.018838 env[1155]: time="2025-05-13T06:54:36.018779184Z" level=info msg="StartContainer for \"0cd8c6ed746f64e76e3966929c35a2da375256f0dba343c0e4dd04894bae932e\" returns successfully" May 13 06:54:36.207898 kubelet[1935]: E0513 06:54:36.207862 1935 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8fghh" podUID="f8774101-e6a2-4977-be65-5647d581d80d" May 13 06:54:36.327323 kubelet[1935]: E0513 06:54:36.327271 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.327323 kubelet[1935]: W0513 06:54:36.327317 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.327588 kubelet[1935]: E0513 06:54:36.327351 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.327990 kubelet[1935]: E0513 06:54:36.327954 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.327990 kubelet[1935]: W0513 06:54:36.327988 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.328198 kubelet[1935]: E0513 06:54:36.328014 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.328596 kubelet[1935]: E0513 06:54:36.328531 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.328596 kubelet[1935]: W0513 06:54:36.328562 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.328596 kubelet[1935]: E0513 06:54:36.328593 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.329156 kubelet[1935]: E0513 06:54:36.329122 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.329156 kubelet[1935]: W0513 06:54:36.329155 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.329334 kubelet[1935]: E0513 06:54:36.329179 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.329709 kubelet[1935]: E0513 06:54:36.329671 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.329709 kubelet[1935]: W0513 06:54:36.329706 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.329897 kubelet[1935]: E0513 06:54:36.329730 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.330222 kubelet[1935]: E0513 06:54:36.330165 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.330222 kubelet[1935]: W0513 06:54:36.330200 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.330222 kubelet[1935]: E0513 06:54:36.330220 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.330594 kubelet[1935]: E0513 06:54:36.330547 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.330594 kubelet[1935]: W0513 06:54:36.330578 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.330761 kubelet[1935]: E0513 06:54:36.330600 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.331152 kubelet[1935]: E0513 06:54:36.330982 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.331152 kubelet[1935]: W0513 06:54:36.331013 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.331152 kubelet[1935]: E0513 06:54:36.331033 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.331381 kubelet[1935]: E0513 06:54:36.331362 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.331446 kubelet[1935]: W0513 06:54:36.331383 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.331446 kubelet[1935]: E0513 06:54:36.331404 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.332135 kubelet[1935]: E0513 06:54:36.331809 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.332135 kubelet[1935]: W0513 06:54:36.331842 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.332135 kubelet[1935]: E0513 06:54:36.331863 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.332584 kubelet[1935]: E0513 06:54:36.332369 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.332584 kubelet[1935]: W0513 06:54:36.332399 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.332584 kubelet[1935]: E0513 06:54:36.332419 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.333164 kubelet[1935]: E0513 06:54:36.332863 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.333164 kubelet[1935]: W0513 06:54:36.332893 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.333164 kubelet[1935]: E0513 06:54:36.332991 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.333620 kubelet[1935]: E0513 06:54:36.333418 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.333620 kubelet[1935]: W0513 06:54:36.333447 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.333620 kubelet[1935]: E0513 06:54:36.333467 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.334199 kubelet[1935]: E0513 06:54:36.333881 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.334199 kubelet[1935]: W0513 06:54:36.334003 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.334199 kubelet[1935]: E0513 06:54:36.334028 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.334962 kubelet[1935]: E0513 06:54:36.334492 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.334962 kubelet[1935]: W0513 06:54:36.334546 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.334962 kubelet[1935]: E0513 06:54:36.334566 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.338013 kubelet[1935]: E0513 06:54:36.337910 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.338013 kubelet[1935]: W0513 06:54:36.338008 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.338209 kubelet[1935]: E0513 06:54:36.338033 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.338617 kubelet[1935]: E0513 06:54:36.338583 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.338617 kubelet[1935]: W0513 06:54:36.338612 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.338782 kubelet[1935]: E0513 06:54:36.338642 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.339776 kubelet[1935]: E0513 06:54:36.339732 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.339891 kubelet[1935]: W0513 06:54:36.339765 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.340066 kubelet[1935]: E0513 06:54:36.340023 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.342086 kubelet[1935]: E0513 06:54:36.342030 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.342086 kubelet[1935]: W0513 06:54:36.342080 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.347263 kubelet[1935]: E0513 06:54:36.347228 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.347484 kubelet[1935]: W0513 06:54:36.347436 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.349176 kubelet[1935]: E0513 06:54:36.349152 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.349351 kubelet[1935]: W0513 06:54:36.349324 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.349522 kubelet[1935]: E0513 06:54:36.349493 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.350006 kubelet[1935]: E0513 06:54:36.349900 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.350168 kubelet[1935]: W0513 06:54:36.350142 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.350300 kubelet[1935]: E0513 06:54:36.350276 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.357400 kubelet[1935]: E0513 06:54:36.357345 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.357646 kubelet[1935]: W0513 06:54:36.357615 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.357814 kubelet[1935]: E0513 06:54:36.357786 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.363972 kubelet[1935]: E0513 06:54:36.362700 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.366234 kubelet[1935]: E0513 06:54:36.363208 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.366234 kubelet[1935]: W0513 06:54:36.365301 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.366234 kubelet[1935]: E0513 06:54:36.365335 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.369423 kubelet[1935]: E0513 06:54:36.363239 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.369423 kubelet[1935]: E0513 06:54:36.368772 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.369423 kubelet[1935]: W0513 06:54:36.368795 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.369423 kubelet[1935]: E0513 06:54:36.368830 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.369423 kubelet[1935]: E0513 06:54:36.369393 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.369423 kubelet[1935]: W0513 06:54:36.369415 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.369870 kubelet[1935]: E0513 06:54:36.369440 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.369870 kubelet[1935]: E0513 06:54:36.369809 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.369870 kubelet[1935]: W0513 06:54:36.369830 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.369870 kubelet[1935]: E0513 06:54:36.369850 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.371100 kubelet[1935]: E0513 06:54:36.370380 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.371100 kubelet[1935]: W0513 06:54:36.370409 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.371100 kubelet[1935]: E0513 06:54:36.370431 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.371333 kubelet[1935]: E0513 06:54:36.371244 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.371333 kubelet[1935]: W0513 06:54:36.371265 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.371333 kubelet[1935]: E0513 06:54:36.371286 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.371725 kubelet[1935]: E0513 06:54:36.371680 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.371725 kubelet[1935]: W0513 06:54:36.371709 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.371891 kubelet[1935]: E0513 06:54:36.371730 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.372132 kubelet[1935]: E0513 06:54:36.372102 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.372132 kubelet[1935]: W0513 06:54:36.372130 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.372280 kubelet[1935]: E0513 06:54:36.372151 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.372563 kubelet[1935]: E0513 06:54:36.372535 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.372641 kubelet[1935]: W0513 06:54:36.372562 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.372641 kubelet[1935]: E0513 06:54:36.372584 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:36.375258 kubelet[1935]: E0513 06:54:36.375122 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:36.375258 kubelet[1935]: W0513 06:54:36.375199 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:36.377456 kubelet[1935]: E0513 06:54:36.375223 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.321841 kubelet[1935]: I0513 06:54:37.321793 1935 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 06:54:37.341860 kubelet[1935]: E0513 06:54:37.341794 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.341860 kubelet[1935]: W0513 06:54:37.341830 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.341860 kubelet[1935]: E0513 06:54:37.341855 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.342243 kubelet[1935]: E0513 06:54:37.342117 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.342243 kubelet[1935]: W0513 06:54:37.342129 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.342243 kubelet[1935]: E0513 06:54:37.342139 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.342446 kubelet[1935]: E0513 06:54:37.342282 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.342446 kubelet[1935]: W0513 06:54:37.342292 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.342446 kubelet[1935]: E0513 06:54:37.342302 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.342684 kubelet[1935]: E0513 06:54:37.342487 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.342684 kubelet[1935]: W0513 06:54:37.342497 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.342684 kubelet[1935]: E0513 06:54:37.342507 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.342684 kubelet[1935]: E0513 06:54:37.342653 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.342684 kubelet[1935]: W0513 06:54:37.342662 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.342684 kubelet[1935]: E0513 06:54:37.342671 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.343154 kubelet[1935]: E0513 06:54:37.342802 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.343154 kubelet[1935]: W0513 06:54:37.342812 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.343154 kubelet[1935]: E0513 06:54:37.342823 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.343154 kubelet[1935]: E0513 06:54:37.342990 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.343154 kubelet[1935]: W0513 06:54:37.343000 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.343154 kubelet[1935]: E0513 06:54:37.343009 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.343154 kubelet[1935]: E0513 06:54:37.343145 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.343154 kubelet[1935]: W0513 06:54:37.343154 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.343154 kubelet[1935]: E0513 06:54:37.343163 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.343706 kubelet[1935]: E0513 06:54:37.343326 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.343706 kubelet[1935]: W0513 06:54:37.343336 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.343706 kubelet[1935]: E0513 06:54:37.343345 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.343706 kubelet[1935]: E0513 06:54:37.343480 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.343706 kubelet[1935]: W0513 06:54:37.343489 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.343706 kubelet[1935]: E0513 06:54:37.343497 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.343706 kubelet[1935]: E0513 06:54:37.343620 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.343706 kubelet[1935]: W0513 06:54:37.343628 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.343706 kubelet[1935]: E0513 06:54:37.343636 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.344390 kubelet[1935]: E0513 06:54:37.343766 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.344390 kubelet[1935]: W0513 06:54:37.343775 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.344390 kubelet[1935]: E0513 06:54:37.343783 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.344390 kubelet[1935]: E0513 06:54:37.343935 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.344390 kubelet[1935]: W0513 06:54:37.343944 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.344390 kubelet[1935]: E0513 06:54:37.343955 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.344390 kubelet[1935]: E0513 06:54:37.344092 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.344390 kubelet[1935]: W0513 06:54:37.344100 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.344390 kubelet[1935]: E0513 06:54:37.344109 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.344390 kubelet[1935]: E0513 06:54:37.344241 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.345085 kubelet[1935]: W0513 06:54:37.344250 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.345085 kubelet[1935]: E0513 06:54:37.344261 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.346731 kubelet[1935]: E0513 06:54:37.346671 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.346731 kubelet[1935]: W0513 06:54:37.346691 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.346731 kubelet[1935]: E0513 06:54:37.346701 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.347028 kubelet[1935]: E0513 06:54:37.346869 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.347028 kubelet[1935]: W0513 06:54:37.346878 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.347028 kubelet[1935]: E0513 06:54:37.346887 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.347239 kubelet[1935]: E0513 06:54:37.347052 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.347239 kubelet[1935]: W0513 06:54:37.347062 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.347239 kubelet[1935]: E0513 06:54:37.347070 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.347239 kubelet[1935]: E0513 06:54:37.347221 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.347239 kubelet[1935]: W0513 06:54:37.347231 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.347239 kubelet[1935]: E0513 06:54:37.347239 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.347606 kubelet[1935]: E0513 06:54:37.347359 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.347606 kubelet[1935]: W0513 06:54:37.347367 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.347606 kubelet[1935]: E0513 06:54:37.347375 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.347606 kubelet[1935]: E0513 06:54:37.347486 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.347606 kubelet[1935]: W0513 06:54:37.347495 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.347606 kubelet[1935]: E0513 06:54:37.347502 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.348041 kubelet[1935]: E0513 06:54:37.347806 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.348041 kubelet[1935]: W0513 06:54:37.347817 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.348041 kubelet[1935]: E0513 06:54:37.347828 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.348501 kubelet[1935]: E0513 06:54:37.348250 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.348501 kubelet[1935]: W0513 06:54:37.348269 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.348501 kubelet[1935]: E0513 06:54:37.348280 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.349215 kubelet[1935]: E0513 06:54:37.348871 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.349215 kubelet[1935]: W0513 06:54:37.348906 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.349215 kubelet[1935]: E0513 06:54:37.349020 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.349806 kubelet[1935]: E0513 06:54:37.349564 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.349806 kubelet[1935]: W0513 06:54:37.349591 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.349806 kubelet[1935]: E0513 06:54:37.349630 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.350460 kubelet[1935]: E0513 06:54:37.350244 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.350460 kubelet[1935]: W0513 06:54:37.350272 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.350460 kubelet[1935]: E0513 06:54:37.350324 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.351096 kubelet[1935]: E0513 06:54:37.350809 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.351096 kubelet[1935]: W0513 06:54:37.350836 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.351096 kubelet[1935]: E0513 06:54:37.350875 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.351702 kubelet[1935]: E0513 06:54:37.351466 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.351702 kubelet[1935]: W0513 06:54:37.351493 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.351702 kubelet[1935]: E0513 06:54:37.351532 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.352419 kubelet[1935]: E0513 06:54:37.352169 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.352419 kubelet[1935]: W0513 06:54:37.352198 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.352419 kubelet[1935]: E0513 06:54:37.352240 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.352813 kubelet[1935]: E0513 06:54:37.352786 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.353054 kubelet[1935]: W0513 06:54:37.353019 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.353256 kubelet[1935]: E0513 06:54:37.353225 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.354150 kubelet[1935]: E0513 06:54:37.353497 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.354150 kubelet[1935]: W0513 06:54:37.353516 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.354150 kubelet[1935]: E0513 06:54:37.353525 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.354150 kubelet[1935]: E0513 06:54:37.353799 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.354150 kubelet[1935]: W0513 06:54:37.353808 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.354150 kubelet[1935]: E0513 06:54:37.353817 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.355697 kubelet[1935]: E0513 06:54:37.355633 1935 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 06:54:37.355896 kubelet[1935]: W0513 06:54:37.355865 1935 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 06:54:37.356216 kubelet[1935]: E0513 06:54:37.356183 1935 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 06:54:37.985949 env[1155]: time="2025-05-13T06:54:37.985833439Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:37.989050 env[1155]: time="2025-05-13T06:54:37.988885707Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:37.991578 env[1155]: time="2025-05-13T06:54:37.991523739Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:37.994013 env[1155]: time="2025-05-13T06:54:37.993960720Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:37.994657 env[1155]: time="2025-05-13T06:54:37.994599512Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 13 06:54:38.000687 env[1155]: time="2025-05-13T06:54:37.998996639Z" level=info msg="CreateContainer within sandbox \"51343e923587e69c5873f41cfd42af9a536d33902f9ba35828ea33ee017b0eeb\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 13 06:54:38.019332 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1729272798.mount: Deactivated successfully. May 13 06:54:38.035382 env[1155]: time="2025-05-13T06:54:38.035303060Z" level=info msg="CreateContainer within sandbox \"51343e923587e69c5873f41cfd42af9a536d33902f9ba35828ea33ee017b0eeb\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"921dbd493b4245522cff89fd2c80700b3e276f6c78752a6b911bf3921eaf41ea\"" May 13 06:54:38.037302 env[1155]: time="2025-05-13T06:54:38.037233439Z" level=info msg="StartContainer for \"921dbd493b4245522cff89fd2c80700b3e276f6c78752a6b911bf3921eaf41ea\"" May 13 06:54:38.085429 systemd[1]: Started cri-containerd-921dbd493b4245522cff89fd2c80700b3e276f6c78752a6b911bf3921eaf41ea.scope. May 13 06:54:38.101000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.105024 kernel: kauditd_printk_skb: 179 callbacks suppressed May 13 06:54:38.105110 kernel: audit: type=1400 audit(1747119278.101:922): avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.101000 audit[2536]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd9998850a8 items=0 ppid=2384 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:38.116671 kernel: audit: type=1300 audit(1747119278.101:922): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd9998850a8 items=0 ppid=2384 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:38.118690 kernel: audit: type=1327 audit(1747119278.101:922): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932316462643439336234323435353232636666383966643263383037 May 13 06:54:38.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932316462643439336234323435353232636666383966643263383037 May 13 06:54:38.123982 kernel: audit: type=1400 audit(1747119278.101:923): avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.101000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.128011 kernel: audit: type=1400 audit(1747119278.101:923): avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.101000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.132403 kernel: audit: type=1400 audit(1747119278.101:923): avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.101000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.101000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.101000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.147365 kernel: audit: type=1400 audit(1747119278.101:923): avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.147412 kernel: audit: type=1400 audit(1747119278.101:923): avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.147459 kernel: audit: type=1400 audit(1747119278.101:923): avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.101000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.153282 kernel: audit: type=1400 audit(1747119278.101:923): avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.101000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.101000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.101000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.101000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.101000 audit: BPF prog-id=130 op=LOAD May 13 06:54:38.101000 audit[2536]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f8908 items=0 ppid=2384 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:38.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932316462643439336234323435353232636666383966643263383037 May 13 06:54:38.115000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.115000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.115000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.115000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.115000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.115000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.115000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.115000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.115000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.115000 audit: BPF prog-id=131 op=LOAD May 13 06:54:38.115000 audit[2536]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f8958 items=0 ppid=2384 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:38.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932316462643439336234323435353232636666383966643263383037 May 13 06:54:38.131000 audit: BPF prog-id=131 op=UNLOAD May 13 06:54:38.131000 audit: BPF prog-id=130 op=UNLOAD May 13 06:54:38.131000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.131000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.131000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.131000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.131000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.131000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.131000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.131000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.131000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.131000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:38.131000 audit: BPF prog-id=132 op=LOAD May 13 06:54:38.131000 audit[2536]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f89e8 items=0 ppid=2384 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:38.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932316462643439336234323435353232636666383966643263383037 May 13 06:54:38.181030 env[1155]: time="2025-05-13T06:54:38.180956016Z" level=info msg="StartContainer for \"921dbd493b4245522cff89fd2c80700b3e276f6c78752a6b911bf3921eaf41ea\" returns successfully" May 13 06:54:38.192552 systemd[1]: cri-containerd-921dbd493b4245522cff89fd2c80700b3e276f6c78752a6b911bf3921eaf41ea.scope: Deactivated successfully. May 13 06:54:38.195000 audit: BPF prog-id=132 op=UNLOAD May 13 06:54:38.208432 kubelet[1935]: E0513 06:54:38.207086 1935 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8fghh" podUID="f8774101-e6a2-4977-be65-5647d581d80d" May 13 06:54:38.489797 kubelet[1935]: I0513 06:54:38.489698 1935 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-85bc846576-q826b" podStartSLOduration=3.879797005 podStartE2EDuration="7.489665883s" podCreationTimestamp="2025-05-13 06:54:31 +0000 UTC" firstStartedPulling="2025-05-13 06:54:32.269061428 +0000 UTC m=+14.196438821" lastFinishedPulling="2025-05-13 06:54:35.878930306 +0000 UTC m=+17.806307699" observedRunningTime="2025-05-13 06:54:36.362450556 +0000 UTC m=+18.289827999" watchObservedRunningTime="2025-05-13 06:54:38.489665883 +0000 UTC m=+20.417043326" May 13 06:54:38.849106 env[1155]: time="2025-05-13T06:54:38.847356175Z" level=info msg="shim disconnected" id=921dbd493b4245522cff89fd2c80700b3e276f6c78752a6b911bf3921eaf41ea May 13 06:54:38.849106 env[1155]: time="2025-05-13T06:54:38.847460593Z" level=warning msg="cleaning up after shim disconnected" id=921dbd493b4245522cff89fd2c80700b3e276f6c78752a6b911bf3921eaf41ea namespace=k8s.io May 13 06:54:38.849106 env[1155]: time="2025-05-13T06:54:38.847484960Z" level=info msg="cleaning up dead shim" May 13 06:54:38.863513 env[1155]: time="2025-05-13T06:54:38.863407014Z" level=warning msg="cleanup warnings time=\"2025-05-13T06:54:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2579 runtime=io.containerd.runc.v2\n" May 13 06:54:39.018101 systemd[1]: run-containerd-runc-k8s.io-921dbd493b4245522cff89fd2c80700b3e276f6c78752a6b911bf3921eaf41ea-runc.HxFQUZ.mount: Deactivated successfully. May 13 06:54:39.018306 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-921dbd493b4245522cff89fd2c80700b3e276f6c78752a6b911bf3921eaf41ea-rootfs.mount: Deactivated successfully. May 13 06:54:39.337260 env[1155]: time="2025-05-13T06:54:39.337177506Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 13 06:54:40.206659 kubelet[1935]: E0513 06:54:40.206591 1935 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8fghh" podUID="f8774101-e6a2-4977-be65-5647d581d80d" May 13 06:54:42.208052 kubelet[1935]: E0513 06:54:42.207903 1935 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8fghh" podUID="f8774101-e6a2-4977-be65-5647d581d80d" May 13 06:54:44.207064 kubelet[1935]: E0513 06:54:44.206985 1935 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8fghh" podUID="f8774101-e6a2-4977-be65-5647d581d80d" May 13 06:54:45.366269 kubelet[1935]: I0513 06:54:45.366230 1935 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 06:54:45.423000 audit[2594]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2594 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:54:45.427508 kernel: kauditd_printk_skb: 34 callbacks suppressed May 13 06:54:45.427564 kernel: audit: type=1325 audit(1747119285.423:929): table=filter:95 family=2 entries=17 op=nft_register_rule pid=2594 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:54:45.423000 audit[2594]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffec0df7de0 a2=0 a3=7ffec0df7dcc items=0 ppid=2110 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:45.451693 kernel: audit: type=1300 audit(1747119285.423:929): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffec0df7de0 a2=0 a3=7ffec0df7dcc items=0 ppid=2110 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:45.423000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:54:45.437000 audit[2594]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2594 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:54:45.460756 kernel: audit: type=1327 audit(1747119285.423:929): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:54:45.460835 kernel: audit: type=1325 audit(1747119285.437:930): table=nat:96 family=2 entries=19 op=nft_register_chain pid=2594 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:54:45.460860 kernel: audit: type=1300 audit(1747119285.437:930): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffec0df7de0 a2=0 a3=7ffec0df7dcc items=0 ppid=2110 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:45.437000 audit[2594]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffec0df7de0 a2=0 a3=7ffec0df7dcc items=0 ppid=2110 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:45.437000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:54:45.472071 kernel: audit: type=1327 audit(1747119285.437:930): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:54:46.209120 kubelet[1935]: E0513 06:54:46.209042 1935 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8fghh" podUID="f8774101-e6a2-4977-be65-5647d581d80d" May 13 06:54:46.879634 env[1155]: time="2025-05-13T06:54:46.879545199Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:46.882959 env[1155]: time="2025-05-13T06:54:46.882880614Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:46.885599 env[1155]: time="2025-05-13T06:54:46.885548676Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:46.888163 env[1155]: time="2025-05-13T06:54:46.888116086Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:54:46.888791 env[1155]: time="2025-05-13T06:54:46.888737102Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 13 06:54:46.894454 env[1155]: time="2025-05-13T06:54:46.894379253Z" level=info msg="CreateContainer within sandbox \"51343e923587e69c5873f41cfd42af9a536d33902f9ba35828ea33ee017b0eeb\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 13 06:54:46.909388 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3090168603.mount: Deactivated successfully. May 13 06:54:46.923215 env[1155]: time="2025-05-13T06:54:46.923144210Z" level=info msg="CreateContainer within sandbox \"51343e923587e69c5873f41cfd42af9a536d33902f9ba35828ea33ee017b0eeb\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"c7b275d6227021ef9c80e8b928b04624acdc8c5356dd68acb59ad6ec9d351e46\"" May 13 06:54:46.925827 env[1155]: time="2025-05-13T06:54:46.924765329Z" level=info msg="StartContainer for \"c7b275d6227021ef9c80e8b928b04624acdc8c5356dd68acb59ad6ec9d351e46\"" May 13 06:54:46.967037 systemd[1]: run-containerd-runc-k8s.io-c7b275d6227021ef9c80e8b928b04624acdc8c5356dd68acb59ad6ec9d351e46-runc.4mHzJd.mount: Deactivated successfully. May 13 06:54:46.971741 systemd[1]: Started cri-containerd-c7b275d6227021ef9c80e8b928b04624acdc8c5356dd68acb59ad6ec9d351e46.scope. May 13 06:54:46.998340 kernel: audit: type=1400 audit(1747119286.985:931): avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.998457 kernel: audit: type=1300 audit(1747119286.985:931): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f8dd8f43b18 items=0 ppid=2384 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:46.985000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.985000 audit[2603]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f8dd8f43b18 items=0 ppid=2384 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:46.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337623237356436323237303231656639633830653862393238623034 May 13 06:54:47.005219 kernel: audit: type=1327 audit(1747119286.985:931): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337623237356436323237303231656639633830653862393238623034 May 13 06:54:47.005254 kernel: audit: type=1400 audit(1747119286.985:932): avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.985000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.985000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.985000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.985000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.985000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.985000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.985000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.985000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.985000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.985000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.985000 audit: BPF prog-id=133 op=LOAD May 13 06:54:46.985000 audit[2603]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00027e9f8 items=0 ppid=2384 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:46.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337623237356436323237303231656639633830653862393238623034 May 13 06:54:46.990000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.990000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.990000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.990000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.990000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.990000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.990000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.990000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.990000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.990000 audit: BPF prog-id=134 op=LOAD May 13 06:54:46.990000 audit[2603]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00027ea48 items=0 ppid=2384 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:46.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337623237356436323237303231656639633830653862393238623034 May 13 06:54:46.997000 audit: BPF prog-id=134 op=UNLOAD May 13 06:54:46.997000 audit: BPF prog-id=133 op=UNLOAD May 13 06:54:46.997000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.997000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.997000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.997000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.997000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.997000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.997000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.997000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.997000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.997000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:54:46.997000 audit: BPF prog-id=135 op=LOAD May 13 06:54:46.997000 audit[2603]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00027ead8 items=0 ppid=2384 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:54:46.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337623237356436323237303231656639633830653862393238623034 May 13 06:54:47.030065 env[1155]: time="2025-05-13T06:54:47.030023164Z" level=info msg="StartContainer for \"c7b275d6227021ef9c80e8b928b04624acdc8c5356dd68acb59ad6ec9d351e46\" returns successfully" May 13 06:54:48.212150 kubelet[1935]: E0513 06:54:48.211912 1935 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8fghh" podUID="f8774101-e6a2-4977-be65-5647d581d80d" May 13 06:54:48.324200 env[1155]: time="2025-05-13T06:54:48.324067413Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 06:54:48.328544 systemd[1]: cri-containerd-c7b275d6227021ef9c80e8b928b04624acdc8c5356dd68acb59ad6ec9d351e46.scope: Deactivated successfully. May 13 06:54:48.331000 audit: BPF prog-id=135 op=UNLOAD May 13 06:54:48.365810 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c7b275d6227021ef9c80e8b928b04624acdc8c5356dd68acb59ad6ec9d351e46-rootfs.mount: Deactivated successfully. May 13 06:54:48.380011 kubelet[1935]: I0513 06:54:48.379047 1935 kubelet_node_status.go:502] "Fast updating node status as it just became ready" May 13 06:54:48.792375 systemd[1]: Created slice kubepods-burstable-poda7244bdd_6814_4742_bcde_9ccc6e210d60.slice. May 13 06:54:48.847210 systemd[1]: Created slice kubepods-besteffort-pod7dd504f7_f59c_4f56_83ca_cfbb5256e7fc.slice. May 13 06:54:48.852682 systemd[1]: Created slice kubepods-burstable-pode974b640_4ca2_42b9_a109_947d123327d0.slice. May 13 06:54:48.857654 systemd[1]: Created slice kubepods-besteffort-pod59af98d4_a46a_486a_ae5b_da7f7fb98080.slice. May 13 06:54:48.862250 kubelet[1935]: I0513 06:54:48.861543 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/e974b640-4ca2-42b9-a109-947d123327d0-config-volume\") pod \"coredns-668d6bf9bc-777cz\" (UID: \"e974b640-4ca2-42b9-a109-947d123327d0\") " pod="kube-system/coredns-668d6bf9bc-777cz" May 13 06:54:48.862250 kubelet[1935]: I0513 06:54:48.861577 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9f406868-14be-4f07-a347-37e45f4acb44-tigera-ca-bundle\") pod \"calico-kube-controllers-55c78455dd-hxgrr\" (UID: \"9f406868-14be-4f07-a347-37e45f4acb44\") " pod="calico-system/calico-kube-controllers-55c78455dd-hxgrr" May 13 06:54:48.862250 kubelet[1935]: I0513 06:54:48.861627 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ps9sn\" (UniqueName: \"kubernetes.io/projected/59af98d4-a46a-486a-ae5b-da7f7fb98080-kube-api-access-ps9sn\") pod \"calico-apiserver-fbfdb4f49-tw2jz\" (UID: \"59af98d4-a46a-486a-ae5b-da7f7fb98080\") " pod="calico-apiserver/calico-apiserver-fbfdb4f49-tw2jz" May 13 06:54:48.862250 kubelet[1935]: I0513 06:54:48.861647 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/7dd504f7-f59c-4f56-83ca-cfbb5256e7fc-calico-apiserver-certs\") pod \"calico-apiserver-579977495-4vp7r\" (UID: \"7dd504f7-f59c-4f56-83ca-cfbb5256e7fc\") " pod="calico-apiserver/calico-apiserver-579977495-4vp7r" May 13 06:54:48.862250 kubelet[1935]: I0513 06:54:48.861683 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/a7244bdd-6814-4742-bcde-9ccc6e210d60-config-volume\") pod \"coredns-668d6bf9bc-6jrqx\" (UID: \"a7244bdd-6814-4742-bcde-9ccc6e210d60\") " pod="kube-system/coredns-668d6bf9bc-6jrqx" May 13 06:54:48.862120 systemd[1]: Created slice kubepods-besteffort-pod9f406868_14be_4f07_a347_37e45f4acb44.slice. May 13 06:54:48.862488 kubelet[1935]: I0513 06:54:48.861707 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-787km\" (UniqueName: \"kubernetes.io/projected/a7244bdd-6814-4742-bcde-9ccc6e210d60-kube-api-access-787km\") pod \"coredns-668d6bf9bc-6jrqx\" (UID: \"a7244bdd-6814-4742-bcde-9ccc6e210d60\") " pod="kube-system/coredns-668d6bf9bc-6jrqx" May 13 06:54:48.862488 kubelet[1935]: I0513 06:54:48.861727 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/59af98d4-a46a-486a-ae5b-da7f7fb98080-calico-apiserver-certs\") pod \"calico-apiserver-fbfdb4f49-tw2jz\" (UID: \"59af98d4-a46a-486a-ae5b-da7f7fb98080\") " pod="calico-apiserver/calico-apiserver-fbfdb4f49-tw2jz" May 13 06:54:48.862488 kubelet[1935]: I0513 06:54:48.861769 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nt462\" (UniqueName: \"kubernetes.io/projected/7dd504f7-f59c-4f56-83ca-cfbb5256e7fc-kube-api-access-nt462\") pod \"calico-apiserver-579977495-4vp7r\" (UID: \"7dd504f7-f59c-4f56-83ca-cfbb5256e7fc\") " pod="calico-apiserver/calico-apiserver-579977495-4vp7r" May 13 06:54:48.862488 kubelet[1935]: I0513 06:54:48.861802 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xtv2k\" (UniqueName: \"kubernetes.io/projected/e4a0e09c-41bf-47f7-91e8-38610cbd0d23-kube-api-access-xtv2k\") pod \"calico-apiserver-579977495-p7jjc\" (UID: \"e4a0e09c-41bf-47f7-91e8-38610cbd0d23\") " pod="calico-apiserver/calico-apiserver-579977495-p7jjc" May 13 06:54:48.862488 kubelet[1935]: I0513 06:54:48.861823 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-98fpj\" (UniqueName: \"kubernetes.io/projected/e974b640-4ca2-42b9-a109-947d123327d0-kube-api-access-98fpj\") pod \"coredns-668d6bf9bc-777cz\" (UID: \"e974b640-4ca2-42b9-a109-947d123327d0\") " pod="kube-system/coredns-668d6bf9bc-777cz" May 13 06:54:48.862692 kubelet[1935]: I0513 06:54:48.861867 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kvn8v\" (UniqueName: \"kubernetes.io/projected/9f406868-14be-4f07-a347-37e45f4acb44-kube-api-access-kvn8v\") pod \"calico-kube-controllers-55c78455dd-hxgrr\" (UID: \"9f406868-14be-4f07-a347-37e45f4acb44\") " pod="calico-system/calico-kube-controllers-55c78455dd-hxgrr" May 13 06:54:48.862692 kubelet[1935]: I0513 06:54:48.861905 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e4a0e09c-41bf-47f7-91e8-38610cbd0d23-calico-apiserver-certs\") pod \"calico-apiserver-579977495-p7jjc\" (UID: \"e4a0e09c-41bf-47f7-91e8-38610cbd0d23\") " pod="calico-apiserver/calico-apiserver-579977495-p7jjc" May 13 06:54:48.872099 systemd[1]: Created slice kubepods-besteffort-pode4a0e09c_41bf_47f7_91e8_38610cbd0d23.slice. May 13 06:54:49.243828 env[1155]: time="2025-05-13T06:54:49.243723363Z" level=info msg="shim disconnected" id=c7b275d6227021ef9c80e8b928b04624acdc8c5356dd68acb59ad6ec9d351e46 May 13 06:54:49.243828 env[1155]: time="2025-05-13T06:54:49.243823792Z" level=warning msg="cleaning up after shim disconnected" id=c7b275d6227021ef9c80e8b928b04624acdc8c5356dd68acb59ad6ec9d351e46 namespace=k8s.io May 13 06:54:49.244190 env[1155]: time="2025-05-13T06:54:49.243848580Z" level=info msg="cleaning up dead shim" May 13 06:54:49.280267 env[1155]: time="2025-05-13T06:54:49.280222327Z" level=warning msg="cleanup warnings time=\"2025-05-13T06:54:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2651 runtime=io.containerd.runc.v2\n" May 13 06:54:49.380957 env[1155]: time="2025-05-13T06:54:49.380166080Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 13 06:54:49.415803 env[1155]: time="2025-05-13T06:54:49.415711320Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-6jrqx,Uid:a7244bdd-6814-4742-bcde-9ccc6e210d60,Namespace:kube-system,Attempt:0,}" May 13 06:54:49.455358 env[1155]: time="2025-05-13T06:54:49.455274713Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-579977495-4vp7r,Uid:7dd504f7-f59c-4f56-83ca-cfbb5256e7fc,Namespace:calico-apiserver,Attempt:0,}" May 13 06:54:49.457386 env[1155]: time="2025-05-13T06:54:49.457317649Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-777cz,Uid:e974b640-4ca2-42b9-a109-947d123327d0,Namespace:kube-system,Attempt:0,}" May 13 06:54:49.461324 env[1155]: time="2025-05-13T06:54:49.461241886Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-fbfdb4f49-tw2jz,Uid:59af98d4-a46a-486a-ae5b-da7f7fb98080,Namespace:calico-apiserver,Attempt:0,}" May 13 06:54:49.473824 env[1155]: time="2025-05-13T06:54:49.473757782Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55c78455dd-hxgrr,Uid:9f406868-14be-4f07-a347-37e45f4acb44,Namespace:calico-system,Attempt:0,}" May 13 06:54:49.475335 env[1155]: time="2025-05-13T06:54:49.475278190Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-579977495-p7jjc,Uid:e4a0e09c-41bf-47f7-91e8-38610cbd0d23,Namespace:calico-apiserver,Attempt:0,}" May 13 06:54:49.624017 env[1155]: time="2025-05-13T06:54:49.623908642Z" level=error msg="Failed to destroy network for sandbox \"b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:49.624726 env[1155]: time="2025-05-13T06:54:49.624691153Z" level=error msg="encountered an error cleaning up failed sandbox \"b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:49.624863 env[1155]: time="2025-05-13T06:54:49.624832932Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-6jrqx,Uid:a7244bdd-6814-4742-bcde-9ccc6e210d60,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:49.626077 kubelet[1935]: E0513 06:54:49.625147 1935 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:49.626077 kubelet[1935]: E0513 06:54:49.625226 1935 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-6jrqx" May 13 06:54:49.626077 kubelet[1935]: E0513 06:54:49.625249 1935 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-6jrqx" May 13 06:54:49.626384 kubelet[1935]: E0513 06:54:49.625292 1935 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-6jrqx_kube-system(a7244bdd-6814-4742-bcde-9ccc6e210d60)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-6jrqx_kube-system(a7244bdd-6814-4742-bcde-9ccc6e210d60)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-6jrqx" podUID="a7244bdd-6814-4742-bcde-9ccc6e210d60" May 13 06:54:49.664485 env[1155]: time="2025-05-13T06:54:49.664429267Z" level=error msg="Failed to destroy network for sandbox \"9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:49.665097 env[1155]: time="2025-05-13T06:54:49.665065983Z" level=error msg="encountered an error cleaning up failed sandbox \"9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:49.665368 env[1155]: time="2025-05-13T06:54:49.665311998Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-579977495-4vp7r,Uid:7dd504f7-f59c-4f56-83ca-cfbb5256e7fc,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:49.667513 kubelet[1935]: E0513 06:54:49.665736 1935 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:49.667513 kubelet[1935]: E0513 06:54:49.665847 1935 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-579977495-4vp7r" May 13 06:54:49.667513 kubelet[1935]: E0513 06:54:49.665891 1935 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-579977495-4vp7r" May 13 06:54:49.667688 kubelet[1935]: E0513 06:54:49.665981 1935 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-579977495-4vp7r_calico-apiserver(7dd504f7-f59c-4f56-83ca-cfbb5256e7fc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-579977495-4vp7r_calico-apiserver(7dd504f7-f59c-4f56-83ca-cfbb5256e7fc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-579977495-4vp7r" podUID="7dd504f7-f59c-4f56-83ca-cfbb5256e7fc" May 13 06:54:49.677375 env[1155]: time="2025-05-13T06:54:49.677270720Z" level=error msg="Failed to destroy network for sandbox \"cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:49.677711 env[1155]: time="2025-05-13T06:54:49.677672200Z" level=error msg="encountered an error cleaning up failed sandbox \"cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:49.677765 env[1155]: time="2025-05-13T06:54:49.677731883Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-fbfdb4f49-tw2jz,Uid:59af98d4-a46a-486a-ae5b-da7f7fb98080,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:49.679529 kubelet[1935]: E0513 06:54:49.678000 1935 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:49.679529 kubelet[1935]: E0513 06:54:49.678083 1935 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-fbfdb4f49-tw2jz" May 13 06:54:49.679529 kubelet[1935]: E0513 06:54:49.678111 1935 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-fbfdb4f49-tw2jz" May 13 06:54:49.679695 kubelet[1935]: E0513 06:54:49.678159 1935 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-fbfdb4f49-tw2jz_calico-apiserver(59af98d4-a46a-486a-ae5b-da7f7fb98080)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-fbfdb4f49-tw2jz_calico-apiserver(59af98d4-a46a-486a-ae5b-da7f7fb98080)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-fbfdb4f49-tw2jz" podUID="59af98d4-a46a-486a-ae5b-da7f7fb98080" May 13 06:54:49.697680 env[1155]: time="2025-05-13T06:54:49.697618738Z" level=error msg="Failed to destroy network for sandbox \"fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:49.698161 env[1155]: time="2025-05-13T06:54:49.698130397Z" level=error msg="encountered an error cleaning up failed sandbox \"fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:49.698279 env[1155]: time="2025-05-13T06:54:49.698249723Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55c78455dd-hxgrr,Uid:9f406868-14be-4f07-a347-37e45f4acb44,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:49.700659 kubelet[1935]: E0513 06:54:49.698594 1935 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:49.700659 kubelet[1935]: E0513 06:54:49.698667 1935 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-55c78455dd-hxgrr" May 13 06:54:49.700659 kubelet[1935]: E0513 06:54:49.698688 1935 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-55c78455dd-hxgrr" May 13 06:54:49.700829 kubelet[1935]: E0513 06:54:49.698764 1935 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-55c78455dd-hxgrr_calico-system(9f406868-14be-4f07-a347-37e45f4acb44)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-55c78455dd-hxgrr_calico-system(9f406868-14be-4f07-a347-37e45f4acb44)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55c78455dd-hxgrr" podUID="9f406868-14be-4f07-a347-37e45f4acb44" May 13 06:54:49.703538 env[1155]: time="2025-05-13T06:54:49.703499138Z" level=error msg="Failed to destroy network for sandbox \"58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:49.704038 env[1155]: time="2025-05-13T06:54:49.704010485Z" level=error msg="encountered an error cleaning up failed sandbox \"58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:49.704200 env[1155]: time="2025-05-13T06:54:49.704169807Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-777cz,Uid:e974b640-4ca2-42b9-a109-947d123327d0,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:49.705006 kubelet[1935]: E0513 06:54:49.704672 1935 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:49.705006 kubelet[1935]: E0513 06:54:49.704743 1935 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-777cz" May 13 06:54:49.705006 kubelet[1935]: E0513 06:54:49.704767 1935 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-777cz" May 13 06:54:49.705143 kubelet[1935]: E0513 06:54:49.704899 1935 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-777cz_kube-system(e974b640-4ca2-42b9-a109-947d123327d0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-777cz_kube-system(e974b640-4ca2-42b9-a109-947d123327d0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-777cz" podUID="e974b640-4ca2-42b9-a109-947d123327d0" May 13 06:54:49.720311 env[1155]: time="2025-05-13T06:54:49.720258134Z" level=error msg="Failed to destroy network for sandbox \"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:49.721580 env[1155]: time="2025-05-13T06:54:49.721546161Z" level=error msg="encountered an error cleaning up failed sandbox \"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:49.721725 env[1155]: time="2025-05-13T06:54:49.721679173Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-579977495-p7jjc,Uid:e4a0e09c-41bf-47f7-91e8-38610cbd0d23,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:49.722410 kubelet[1935]: E0513 06:54:49.722074 1935 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:49.722410 kubelet[1935]: E0513 06:54:49.722130 1935 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-579977495-p7jjc" May 13 06:54:49.722410 kubelet[1935]: E0513 06:54:49.722171 1935 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-579977495-p7jjc" May 13 06:54:49.722565 kubelet[1935]: E0513 06:54:49.722236 1935 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-579977495-p7jjc_calico-apiserver(e4a0e09c-41bf-47f7-91e8-38610cbd0d23)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-579977495-p7jjc_calico-apiserver(e4a0e09c-41bf-47f7-91e8-38610cbd0d23)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-579977495-p7jjc" podUID="e4a0e09c-41bf-47f7-91e8-38610cbd0d23" May 13 06:54:50.218467 systemd[1]: Created slice kubepods-besteffort-podf8774101_e6a2_4977_be65_5647d581d80d.slice. May 13 06:54:50.225012 env[1155]: time="2025-05-13T06:54:50.224761311Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8fghh,Uid:f8774101-e6a2-4977-be65-5647d581d80d,Namespace:calico-system,Attempt:0,}" May 13 06:54:50.357437 env[1155]: time="2025-05-13T06:54:50.357335741Z" level=error msg="Failed to destroy network for sandbox \"d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:50.361958 env[1155]: time="2025-05-13T06:54:50.360223637Z" level=error msg="encountered an error cleaning up failed sandbox \"d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:50.361958 env[1155]: time="2025-05-13T06:54:50.360314879Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8fghh,Uid:f8774101-e6a2-4977-be65-5647d581d80d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:50.365585 kubelet[1935]: E0513 06:54:50.364072 1935 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:50.365585 kubelet[1935]: E0513 06:54:50.364125 1935 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-8fghh" May 13 06:54:50.365585 kubelet[1935]: E0513 06:54:50.364165 1935 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-8fghh" May 13 06:54:50.365754 kubelet[1935]: E0513 06:54:50.364205 1935 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-8fghh_calico-system(f8774101-e6a2-4977-be65-5647d581d80d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-8fghh_calico-system(f8774101-e6a2-4977-be65-5647d581d80d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8fghh" podUID="f8774101-e6a2-4977-be65-5647d581d80d" May 13 06:54:50.371708 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67-shm.mount: Deactivated successfully. May 13 06:54:50.371944 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224-shm.mount: Deactivated successfully. May 13 06:54:50.379937 kubelet[1935]: I0513 06:54:50.379677 1935 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" May 13 06:54:50.381682 env[1155]: time="2025-05-13T06:54:50.381651714Z" level=info msg="StopPodSandbox for \"b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224\"" May 13 06:54:50.384745 kubelet[1935]: I0513 06:54:50.384220 1935 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" May 13 06:54:50.386094 env[1155]: time="2025-05-13T06:54:50.386063372Z" level=info msg="StopPodSandbox for \"fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5\"" May 13 06:54:50.387938 kubelet[1935]: I0513 06:54:50.387542 1935 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" May 13 06:54:50.388143 env[1155]: time="2025-05-13T06:54:50.388121227Z" level=info msg="StopPodSandbox for \"cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67\"" May 13 06:54:50.392650 kubelet[1935]: I0513 06:54:50.391839 1935 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" May 13 06:54:50.393065 env[1155]: time="2025-05-13T06:54:50.393037911Z" level=info msg="StopPodSandbox for \"d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c\"" May 13 06:54:50.396958 kubelet[1935]: I0513 06:54:50.395828 1935 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" May 13 06:54:50.398081 env[1155]: time="2025-05-13T06:54:50.397282001Z" level=info msg="StopPodSandbox for \"58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515\"" May 13 06:54:50.402429 kubelet[1935]: I0513 06:54:50.400741 1935 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" May 13 06:54:50.404420 env[1155]: time="2025-05-13T06:54:50.404390924Z" level=info msg="StopPodSandbox for \"9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f\"" May 13 06:54:50.406394 kubelet[1935]: I0513 06:54:50.405930 1935 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" May 13 06:54:50.409215 env[1155]: time="2025-05-13T06:54:50.409161942Z" level=info msg="StopPodSandbox for \"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\"" May 13 06:54:50.491934 env[1155]: time="2025-05-13T06:54:50.490695448Z" level=error msg="StopPodSandbox for \"58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515\" failed" error="failed to destroy network for sandbox \"58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:50.492233 env[1155]: time="2025-05-13T06:54:50.492123501Z" level=error msg="StopPodSandbox for \"fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5\" failed" error="failed to destroy network for sandbox \"fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:50.492615 kubelet[1935]: E0513 06:54:50.492481 1935 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" May 13 06:54:50.492615 kubelet[1935]: E0513 06:54:50.492508 1935 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" May 13 06:54:50.492722 kubelet[1935]: E0513 06:54:50.492561 1935 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5"} May 13 06:54:50.492722 kubelet[1935]: E0513 06:54:50.492656 1935 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9f406868-14be-4f07-a347-37e45f4acb44\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 06:54:50.492722 kubelet[1935]: E0513 06:54:50.492681 1935 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9f406868-14be-4f07-a347-37e45f4acb44\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55c78455dd-hxgrr" podUID="9f406868-14be-4f07-a347-37e45f4acb44" May 13 06:54:50.492722 kubelet[1935]: E0513 06:54:50.492591 1935 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515"} May 13 06:54:50.492899 kubelet[1935]: E0513 06:54:50.492726 1935 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e974b640-4ca2-42b9-a109-947d123327d0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 06:54:50.492899 kubelet[1935]: E0513 06:54:50.492754 1935 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e974b640-4ca2-42b9-a109-947d123327d0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-777cz" podUID="e974b640-4ca2-42b9-a109-947d123327d0" May 13 06:54:50.519266 env[1155]: time="2025-05-13T06:54:50.519210737Z" level=error msg="StopPodSandbox for \"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\" failed" error="failed to destroy network for sandbox \"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:50.519803 kubelet[1935]: E0513 06:54:50.519622 1935 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" May 13 06:54:50.519803 kubelet[1935]: E0513 06:54:50.519693 1935 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750"} May 13 06:54:50.519803 kubelet[1935]: E0513 06:54:50.519730 1935 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e4a0e09c-41bf-47f7-91e8-38610cbd0d23\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 06:54:50.519803 kubelet[1935]: E0513 06:54:50.519772 1935 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e4a0e09c-41bf-47f7-91e8-38610cbd0d23\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-579977495-p7jjc" podUID="e4a0e09c-41bf-47f7-91e8-38610cbd0d23" May 13 06:54:50.528609 env[1155]: time="2025-05-13T06:54:50.528536915Z" level=error msg="StopPodSandbox for \"d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c\" failed" error="failed to destroy network for sandbox \"d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:50.529025 kubelet[1935]: E0513 06:54:50.528847 1935 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" May 13 06:54:50.529025 kubelet[1935]: E0513 06:54:50.528894 1935 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c"} May 13 06:54:50.529025 kubelet[1935]: E0513 06:54:50.528953 1935 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f8774101-e6a2-4977-be65-5647d581d80d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 06:54:50.529025 kubelet[1935]: E0513 06:54:50.528979 1935 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f8774101-e6a2-4977-be65-5647d581d80d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8fghh" podUID="f8774101-e6a2-4977-be65-5647d581d80d" May 13 06:54:50.530784 env[1155]: time="2025-05-13T06:54:50.530741206Z" level=error msg="StopPodSandbox for \"cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67\" failed" error="failed to destroy network for sandbox \"cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:50.531192 kubelet[1935]: E0513 06:54:50.531066 1935 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" May 13 06:54:50.531192 kubelet[1935]: E0513 06:54:50.531099 1935 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67"} May 13 06:54:50.531192 kubelet[1935]: E0513 06:54:50.531145 1935 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"59af98d4-a46a-486a-ae5b-da7f7fb98080\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 06:54:50.531192 kubelet[1935]: E0513 06:54:50.531170 1935 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"59af98d4-a46a-486a-ae5b-da7f7fb98080\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-fbfdb4f49-tw2jz" podUID="59af98d4-a46a-486a-ae5b-da7f7fb98080" May 13 06:54:50.531506 env[1155]: time="2025-05-13T06:54:50.531464866Z" level=error msg="StopPodSandbox for \"b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224\" failed" error="failed to destroy network for sandbox \"b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:50.531737 kubelet[1935]: E0513 06:54:50.531690 1935 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" May 13 06:54:50.531789 kubelet[1935]: E0513 06:54:50.531738 1935 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224"} May 13 06:54:50.531789 kubelet[1935]: E0513 06:54:50.531771 1935 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a7244bdd-6814-4742-bcde-9ccc6e210d60\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 06:54:50.531874 kubelet[1935]: E0513 06:54:50.531797 1935 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a7244bdd-6814-4742-bcde-9ccc6e210d60\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-6jrqx" podUID="a7244bdd-6814-4742-bcde-9ccc6e210d60" May 13 06:54:50.541239 env[1155]: time="2025-05-13T06:54:50.541180631Z" level=error msg="StopPodSandbox for \"9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f\" failed" error="failed to destroy network for sandbox \"9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 06:54:50.541718 kubelet[1935]: E0513 06:54:50.541554 1935 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" May 13 06:54:50.541718 kubelet[1935]: E0513 06:54:50.541601 1935 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f"} May 13 06:54:50.541718 kubelet[1935]: E0513 06:54:50.541652 1935 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7dd504f7-f59c-4f56-83ca-cfbb5256e7fc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 06:54:50.541718 kubelet[1935]: E0513 06:54:50.541678 1935 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7dd504f7-f59c-4f56-83ca-cfbb5256e7fc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-579977495-4vp7r" podUID="7dd504f7-f59c-4f56-83ca-cfbb5256e7fc" May 13 06:55:00.289882 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2349123462.mount: Deactivated successfully. May 13 06:55:00.351696 env[1155]: time="2025-05-13T06:55:00.351592599Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:00.355334 env[1155]: time="2025-05-13T06:55:00.355263790Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:00.358142 env[1155]: time="2025-05-13T06:55:00.358094131Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:00.361328 env[1155]: time="2025-05-13T06:55:00.361262571Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:00.363856 env[1155]: time="2025-05-13T06:55:00.363778154Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 13 06:55:00.404965 env[1155]: time="2025-05-13T06:55:00.404836398Z" level=info msg="CreateContainer within sandbox \"51343e923587e69c5873f41cfd42af9a536d33902f9ba35828ea33ee017b0eeb\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 13 06:55:00.444132 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1149145362.mount: Deactivated successfully. May 13 06:55:00.446907 env[1155]: time="2025-05-13T06:55:00.446832300Z" level=info msg="CreateContainer within sandbox \"51343e923587e69c5873f41cfd42af9a536d33902f9ba35828ea33ee017b0eeb\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a\"" May 13 06:55:00.449073 env[1155]: time="2025-05-13T06:55:00.447450551Z" level=info msg="StartContainer for \"7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a\"" May 13 06:55:00.466358 systemd[1]: Started cri-containerd-7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a.scope. May 13 06:55:00.486000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.488402 kernel: kauditd_printk_skb: 40 callbacks suppressed May 13 06:55:00.488457 kernel: audit: type=1400 audit(1747119300.486:938): avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.486000 audit[3036]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fc3a26f62f8 items=0 ppid=2384 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:00.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762356434616138633765653031666261393733613538303265363735 May 13 06:55:00.506809 kernel: audit: type=1300 audit(1747119300.486:938): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fc3a26f62f8 items=0 ppid=2384 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:00.506854 kernel: audit: type=1327 audit(1747119300.486:938): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762356434616138633765653031666261393733613538303265363735 May 13 06:55:00.506882 kernel: audit: type=1400 audit(1747119300.486:939): avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.486000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.486000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.516026 kernel: audit: type=1400 audit(1747119300.486:939): avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.486000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.520930 kernel: audit: type=1400 audit(1747119300.486:939): avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.486000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.486000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.531465 kernel: audit: type=1400 audit(1747119300.486:939): avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.531513 kernel: audit: type=1400 audit(1747119300.486:939): avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.486000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.486000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.547817 kernel: audit: type=1400 audit(1747119300.486:939): avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.547872 kernel: audit: type=1400 audit(1747119300.486:939): avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.486000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.486000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.486000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.486000 audit: BPF prog-id=136 op=LOAD May 13 06:55:00.486000 audit[3036]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0000248f8 items=0 ppid=2384 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:00.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762356434616138633765653031666261393733613538303265363735 May 13 06:55:00.492000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.492000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.492000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.492000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.492000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.492000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.492000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.492000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.492000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.492000 audit: BPF prog-id=137 op=LOAD May 13 06:55:00.492000 audit[3036]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000024948 items=0 ppid=2384 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:00.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762356434616138633765653031666261393733613538303265363735 May 13 06:55:00.499000 audit: BPF prog-id=137 op=UNLOAD May 13 06:55:00.499000 audit: BPF prog-id=136 op=UNLOAD May 13 06:55:00.499000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.499000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.499000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.499000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.499000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.499000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.499000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.499000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.499000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.499000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:00.499000 audit: BPF prog-id=138 op=LOAD May 13 06:55:00.499000 audit[3036]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0000249d8 items=0 ppid=2384 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:00.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762356434616138633765653031666261393733613538303265363735 May 13 06:55:00.565323 env[1155]: time="2025-05-13T06:55:00.565251164Z" level=info msg="StartContainer for \"7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a\" returns successfully" May 13 06:55:00.649511 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 13 06:55:00.649685 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 13 06:55:01.208456 env[1155]: time="2025-05-13T06:55:01.208358857Z" level=info msg="StopPodSandbox for \"d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c\"" May 13 06:55:01.389252 env[1155]: 2025-05-13 06:55:01.329 [INFO][3105] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" May 13 06:55:01.389252 env[1155]: 2025-05-13 06:55:01.330 [INFO][3105] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" iface="eth0" netns="/var/run/netns/cni-8188d1d3-d448-c890-b8d7-8b39182a1908" May 13 06:55:01.389252 env[1155]: 2025-05-13 06:55:01.330 [INFO][3105] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" iface="eth0" netns="/var/run/netns/cni-8188d1d3-d448-c890-b8d7-8b39182a1908" May 13 06:55:01.389252 env[1155]: 2025-05-13 06:55:01.330 [INFO][3105] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" iface="eth0" netns="/var/run/netns/cni-8188d1d3-d448-c890-b8d7-8b39182a1908" May 13 06:55:01.389252 env[1155]: 2025-05-13 06:55:01.330 [INFO][3105] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" May 13 06:55:01.389252 env[1155]: 2025-05-13 06:55:01.330 [INFO][3105] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" May 13 06:55:01.389252 env[1155]: 2025-05-13 06:55:01.368 [INFO][3112] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" HandleID="k8s-pod-network.d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-eth0" May 13 06:55:01.389252 env[1155]: 2025-05-13 06:55:01.368 [INFO][3112] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:01.389252 env[1155]: 2025-05-13 06:55:01.368 [INFO][3112] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:01.389252 env[1155]: 2025-05-13 06:55:01.382 [WARNING][3112] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" HandleID="k8s-pod-network.d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-eth0" May 13 06:55:01.389252 env[1155]: 2025-05-13 06:55:01.382 [INFO][3112] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" HandleID="k8s-pod-network.d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-eth0" May 13 06:55:01.389252 env[1155]: 2025-05-13 06:55:01.384 [INFO][3112] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:01.389252 env[1155]: 2025-05-13 06:55:01.386 [INFO][3105] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" May 13 06:55:01.391705 systemd[1]: run-netns-cni\x2d8188d1d3\x2dd448\x2dc890\x2db8d7\x2d8b39182a1908.mount: Deactivated successfully. May 13 06:55:01.396479 env[1155]: time="2025-05-13T06:55:01.396413244Z" level=info msg="TearDown network for sandbox \"d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c\" successfully" May 13 06:55:01.396556 env[1155]: time="2025-05-13T06:55:01.396508572Z" level=info msg="StopPodSandbox for \"d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c\" returns successfully" May 13 06:55:01.397522 env[1155]: time="2025-05-13T06:55:01.397464697Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8fghh,Uid:f8774101-e6a2-4977-be65-5647d581d80d,Namespace:calico-system,Attempt:1,}" May 13 06:55:01.588028 systemd-networkd[971]: cali9ad80842375: Link UP May 13 06:55:01.592903 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 06:55:01.593090 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9ad80842375: link becomes ready May 13 06:55:01.597657 systemd-networkd[971]: cali9ad80842375: Gained carrier May 13 06:55:01.605671 kubelet[1935]: I0513 06:55:01.605207 1935 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-pnrj8" podStartSLOduration=2.565133314 podStartE2EDuration="30.605188962s" podCreationTimestamp="2025-05-13 06:54:31 +0000 UTC" firstStartedPulling="2025-05-13 06:54:32.325961492 +0000 UTC m=+14.253338895" lastFinishedPulling="2025-05-13 06:55:00.3660171 +0000 UTC m=+42.293394543" observedRunningTime="2025-05-13 06:55:01.491696254 +0000 UTC m=+43.419073647" watchObservedRunningTime="2025-05-13 06:55:01.605188962 +0000 UTC m=+43.532566355" May 13 06:55:01.607519 env[1155]: 2025-05-13 06:55:01.470 [INFO][3120] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 13 06:55:01.607519 env[1155]: 2025-05-13 06:55:01.494 [INFO][3120] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-eth0 csi-node-driver- calico-system f8774101-e6a2-4977-be65-5647d581d80d 793 0 2025-05-13 06:54:32 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5b5cc68cd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510-3-7-n-7f05b50207.novalocal csi-node-driver-8fghh eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali9ad80842375 [] []}} ContainerID="592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8" Namespace="calico-system" Pod="csi-node-driver-8fghh" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-" May 13 06:55:01.607519 env[1155]: 2025-05-13 06:55:01.495 [INFO][3120] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8" Namespace="calico-system" Pod="csi-node-driver-8fghh" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-eth0" May 13 06:55:01.607519 env[1155]: 2025-05-13 06:55:01.530 [INFO][3149] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8" HandleID="k8s-pod-network.592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-eth0" May 13 06:55:01.607519 env[1155]: 2025-05-13 06:55:01.544 [INFO][3149] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8" HandleID="k8s-pod-network.592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000290b20), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-7-n-7f05b50207.novalocal", "pod":"csi-node-driver-8fghh", "timestamp":"2025-05-13 06:55:01.530226168 +0000 UTC"}, Hostname:"ci-3510-3-7-n-7f05b50207.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 06:55:01.607519 env[1155]: 2025-05-13 06:55:01.544 [INFO][3149] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:01.607519 env[1155]: 2025-05-13 06:55:01.544 [INFO][3149] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:01.607519 env[1155]: 2025-05-13 06:55:01.544 [INFO][3149] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-7f05b50207.novalocal' May 13 06:55:01.607519 env[1155]: 2025-05-13 06:55:01.546 [INFO][3149] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:01.607519 env[1155]: 2025-05-13 06:55:01.549 [INFO][3149] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:01.607519 env[1155]: 2025-05-13 06:55:01.554 [INFO][3149] ipam/ipam.go 489: Trying affinity for 192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:01.607519 env[1155]: 2025-05-13 06:55:01.557 [INFO][3149] ipam/ipam.go 155: Attempting to load block cidr=192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:01.607519 env[1155]: 2025-05-13 06:55:01.559 [INFO][3149] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:01.607519 env[1155]: 2025-05-13 06:55:01.559 [INFO][3149] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.0/26 handle="k8s-pod-network.592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:01.607519 env[1155]: 2025-05-13 06:55:01.563 [INFO][3149] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8 May 13 06:55:01.607519 env[1155]: 2025-05-13 06:55:01.569 [INFO][3149] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.20.0/26 handle="k8s-pod-network.592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:01.607519 env[1155]: 2025-05-13 06:55:01.576 [INFO][3149] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.20.1/26] block=192.168.20.0/26 handle="k8s-pod-network.592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:01.607519 env[1155]: 2025-05-13 06:55:01.576 [INFO][3149] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.1/26] handle="k8s-pod-network.592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:01.607519 env[1155]: 2025-05-13 06:55:01.576 [INFO][3149] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:01.607519 env[1155]: 2025-05-13 06:55:01.576 [INFO][3149] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.20.1/26] IPv6=[] ContainerID="592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8" HandleID="k8s-pod-network.592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-eth0" May 13 06:55:01.608221 env[1155]: 2025-05-13 06:55:01.578 [INFO][3120] cni-plugin/k8s.go 386: Populated endpoint ContainerID="592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8" Namespace="calico-system" Pod="csi-node-driver-8fghh" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f8774101-e6a2-4977-be65-5647d581d80d", ResourceVersion:"793", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"", Pod:"csi-node-driver-8fghh", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.20.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9ad80842375", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:01.608221 env[1155]: 2025-05-13 06:55:01.578 [INFO][3120] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.20.1/32] ContainerID="592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8" Namespace="calico-system" Pod="csi-node-driver-8fghh" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-eth0" May 13 06:55:01.608221 env[1155]: 2025-05-13 06:55:01.578 [INFO][3120] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9ad80842375 ContainerID="592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8" Namespace="calico-system" Pod="csi-node-driver-8fghh" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-eth0" May 13 06:55:01.608221 env[1155]: 2025-05-13 06:55:01.588 [INFO][3120] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8" Namespace="calico-system" Pod="csi-node-driver-8fghh" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-eth0" May 13 06:55:01.608221 env[1155]: 2025-05-13 06:55:01.589 [INFO][3120] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8" Namespace="calico-system" Pod="csi-node-driver-8fghh" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f8774101-e6a2-4977-be65-5647d581d80d", ResourceVersion:"793", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8", Pod:"csi-node-driver-8fghh", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.20.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9ad80842375", MAC:"06:13:26:ab:d9:29", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:01.608221 env[1155]: 2025-05-13 06:55:01.606 [INFO][3120] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8" Namespace="calico-system" Pod="csi-node-driver-8fghh" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-eth0" May 13 06:55:01.619128 env[1155]: time="2025-05-13T06:55:01.619063326Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 06:55:01.619128 env[1155]: time="2025-05-13T06:55:01.619106407Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 06:55:01.619328 env[1155]: time="2025-05-13T06:55:01.619119950Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 06:55:01.619328 env[1155]: time="2025-05-13T06:55:01.619243734Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8 pid=3181 runtime=io.containerd.runc.v2 May 13 06:55:01.630316 systemd[1]: Started cri-containerd-592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8.scope. May 13 06:55:01.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.642000 audit: BPF prog-id=139 op=LOAD May 13 06:55:01.642000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.642000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3181 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:01.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539326530313363303665373563396665363938333732366539663765 May 13 06:55:01.643000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.643000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3181 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:01.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539326530313363303665373563396665363938333732366539663765 May 13 06:55:01.643000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.643000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.643000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.643000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.643000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.643000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.643000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.643000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.643000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.643000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.643000 audit: BPF prog-id=140 op=LOAD May 13 06:55:01.643000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d5650 items=0 ppid=3181 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:01.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539326530313363303665373563396665363938333732366539663765 May 13 06:55:01.644000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.644000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.644000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.644000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.644000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.644000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.644000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.644000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.644000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.644000 audit: BPF prog-id=141 op=LOAD May 13 06:55:01.644000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d5698 items=0 ppid=3181 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:01.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539326530313363303665373563396665363938333732366539663765 May 13 06:55:01.644000 audit: BPF prog-id=141 op=UNLOAD May 13 06:55:01.644000 audit: BPF prog-id=140 op=UNLOAD May 13 06:55:01.644000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.644000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.644000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.644000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.644000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.644000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.644000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.644000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.644000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.644000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:01.644000 audit: BPF prog-id=142 op=LOAD May 13 06:55:01.644000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d5aa8 items=0 ppid=3181 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:01.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539326530313363303665373563396665363938333732366539663765 May 13 06:55:01.657013 env[1155]: time="2025-05-13T06:55:01.656970328Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8fghh,Uid:f8774101-e6a2-4977-be65-5647d581d80d,Namespace:calico-system,Attempt:1,} returns sandbox id \"592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8\"" May 13 06:55:01.659230 env[1155]: time="2025-05-13T06:55:01.659209258Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 13 06:55:02.008000 audit[3237]: AVC avc: denied { write } for pid=3237 comm="tee" name="fd" dev="proc" ino=25341 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 06:55:02.008000 audit[3237]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff8fad99f5 a2=241 a3=1b6 items=1 ppid=3223 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.008000 audit: CWD cwd="/etc/service/enabled/bird/log" May 13 06:55:02.008000 audit: PATH item=0 name="/dev/fd/63" inode=25336 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:55:02.008000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 06:55:02.091000 audit[3258]: AVC avc: denied { write } for pid=3258 comm="tee" name="fd" dev="proc" ino=26194 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 06:55:02.091000 audit[3258]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd85c929f4 a2=241 a3=1b6 items=1 ppid=3226 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.091000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 13 06:55:02.091000 audit: PATH item=0 name="/dev/fd/63" inode=26180 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:55:02.091000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 06:55:02.110000 audit[3278]: AVC avc: denied { write } for pid=3278 comm="tee" name="fd" dev="proc" ino=26208 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 06:55:02.110000 audit[3278]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd35d0b9f6 a2=241 a3=1b6 items=1 ppid=3229 pid=3278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.110000 audit: CWD cwd="/etc/service/enabled/cni/log" May 13 06:55:02.110000 audit: PATH item=0 name="/dev/fd/63" inode=26189 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:55:02.110000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 06:55:02.124000 audit[3290]: AVC avc: denied { write } for pid=3290 comm="tee" name="fd" dev="proc" ino=26214 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 06:55:02.124000 audit[3290]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4c8d29e4 a2=241 a3=1b6 items=1 ppid=3235 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.124000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 13 06:55:02.124000 audit: PATH item=0 name="/dev/fd/63" inode=25361 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:55:02.126000 audit[3286]: AVC avc: denied { write } for pid=3286 comm="tee" name="fd" dev="proc" ino=26218 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 06:55:02.126000 audit[3286]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe394979f4 a2=241 a3=1b6 items=1 ppid=3240 pid=3286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.126000 audit: CWD cwd="/etc/service/enabled/felix/log" May 13 06:55:02.126000 audit: PATH item=0 name="/dev/fd/63" inode=26201 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:55:02.126000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 06:55:02.136000 audit[3284]: AVC avc: denied { write } for pid=3284 comm="tee" name="fd" dev="proc" ino=26222 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 06:55:02.136000 audit[3284]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2f8ea9e5 a2=241 a3=1b6 items=1 ppid=3222 pid=3284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.136000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 13 06:55:02.136000 audit: PATH item=0 name="/dev/fd/63" inode=26200 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:55:02.146000 audit[3293]: AVC avc: denied { write } for pid=3293 comm="tee" name="fd" dev="proc" ino=26226 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 06:55:02.146000 audit[3293]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff200a69f4 a2=241 a3=1b6 items=1 ppid=3225 pid=3293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.146000 audit: CWD cwd="/etc/service/enabled/confd/log" May 13 06:55:02.146000 audit: PATH item=0 name="/dev/fd/63" inode=25363 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:55:02.136000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 06:55:02.124000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 06:55:02.146000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 06:55:02.293739 systemd[1]: run-containerd-runc-k8s.io-7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a-runc.3vXMA6.mount: Deactivated successfully. May 13 06:55:02.405000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit: BPF prog-id=143 op=LOAD May 13 06:55:02.405000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff6dd094b0 a2=98 a3=3 items=0 ppid=3241 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.405000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:02.405000 audit: BPF prog-id=143 op=UNLOAD May 13 06:55:02.405000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit: BPF prog-id=144 op=LOAD May 13 06:55:02.405000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff6dd09290 a2=74 a3=540051 items=0 ppid=3241 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.405000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:02.405000 audit: BPF prog-id=144 op=UNLOAD May 13 06:55:02.405000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.405000 audit: BPF prog-id=145 op=LOAD May 13 06:55:02.405000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff6dd092c0 a2=94 a3=2 items=0 ppid=3241 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.405000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:02.405000 audit: BPF prog-id=145 op=UNLOAD May 13 06:55:02.469652 systemd[1]: run-containerd-runc-k8s.io-7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a-runc.e2ALOD.mount: Deactivated successfully. May 13 06:55:02.579000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.579000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.579000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.579000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.579000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.579000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.579000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.579000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.579000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.579000 audit: BPF prog-id=146 op=LOAD May 13 06:55:02.579000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff6dd09180 a2=40 a3=1 items=0 ppid=3241 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.579000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:02.580000 audit: BPF prog-id=146 op=UNLOAD May 13 06:55:02.580000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.580000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff6dd09250 a2=50 a3=7fff6dd09330 items=0 ppid=3241 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.580000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:02.591000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.591000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6dd09190 a2=28 a3=0 items=0 ppid=3241 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.591000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:02.591000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.591000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6dd091c0 a2=28 a3=0 items=0 ppid=3241 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.591000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:02.591000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.591000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6dd090d0 a2=28 a3=0 items=0 ppid=3241 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.591000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:02.591000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.591000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6dd091e0 a2=28 a3=0 items=0 ppid=3241 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.591000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:02.591000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.591000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6dd091c0 a2=28 a3=0 items=0 ppid=3241 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.591000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:02.591000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.591000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6dd091b0 a2=28 a3=0 items=0 ppid=3241 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.591000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:02.591000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.591000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6dd091e0 a2=28 a3=0 items=0 ppid=3241 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.591000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:02.591000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.591000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6dd091c0 a2=28 a3=0 items=0 ppid=3241 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.591000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:02.591000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.591000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6dd091e0 a2=28 a3=0 items=0 ppid=3241 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.591000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:02.591000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.591000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6dd091b0 a2=28 a3=0 items=0 ppid=3241 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.591000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:02.591000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.591000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6dd09220 a2=28 a3=0 items=0 ppid=3241 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.591000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:02.591000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.591000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff6dd08fd0 a2=50 a3=1 items=0 ppid=3241 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.591000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:02.591000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.591000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.591000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.591000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.591000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.591000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.591000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.591000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.591000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.591000 audit: BPF prog-id=147 op=LOAD May 13 06:55:02.591000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff6dd08fd0 a2=94 a3=5 items=0 ppid=3241 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.591000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:02.592000 audit: BPF prog-id=147 op=UNLOAD May 13 06:55:02.592000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff6dd09080 a2=50 a3=1 items=0 ppid=3241 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.592000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:02.592000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff6dd091a0 a2=4 a3=38 items=0 ppid=3241 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.592000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:02.592000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { confidentiality } for pid=3336 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 06:55:02.592000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff6dd091f0 a2=94 a3=6 items=0 ppid=3241 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.592000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:02.592000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { confidentiality } for pid=3336 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 06:55:02.592000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff6dd089a0 a2=94 a3=83 items=0 ppid=3241 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.592000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:02.592000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.592000 audit[3336]: AVC avc: denied { confidentiality } for pid=3336 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 06:55:02.592000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff6dd089a0 a2=94 a3=83 items=0 ppid=3241 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.592000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:02.602000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.602000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.602000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.602000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.602000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.602000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.602000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.602000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.602000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.602000 audit: BPF prog-id=148 op=LOAD May 13 06:55:02.602000 audit[3360]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcacf611c0 a2=98 a3=1999999999999999 items=0 ppid=3241 pid=3360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.602000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 06:55:02.603000 audit: BPF prog-id=148 op=UNLOAD May 13 06:55:02.603000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.603000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.603000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.603000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.603000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.603000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.603000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.603000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.603000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.603000 audit: BPF prog-id=149 op=LOAD May 13 06:55:02.603000 audit[3360]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcacf610a0 a2=74 a3=ffff items=0 ppid=3241 pid=3360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.603000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 06:55:02.603000 audit: BPF prog-id=149 op=UNLOAD May 13 06:55:02.603000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.603000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.603000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.603000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.603000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.603000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.603000 audit[3360]: AVC avc: denied { perfmon } for pid=3360 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.603000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.603000 audit[3360]: AVC avc: denied { bpf } for pid=3360 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.603000 audit: BPF prog-id=150 op=LOAD May 13 06:55:02.603000 audit[3360]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcacf610e0 a2=40 a3=7ffcacf612c0 items=0 ppid=3241 pid=3360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.603000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 06:55:02.603000 audit: BPF prog-id=150 op=UNLOAD May 13 06:55:02.702607 systemd-networkd[971]: vxlan.calico: Link UP May 13 06:55:02.702613 systemd-networkd[971]: vxlan.calico: Gained carrier May 13 06:55:02.733000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.733000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.733000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.733000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.733000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.733000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.733000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.733000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.733000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.733000 audit: BPF prog-id=151 op=LOAD May 13 06:55:02.733000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdb19a8660 a2=98 a3=100 items=0 ppid=3241 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.733000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:02.734000 audit: BPF prog-id=151 op=UNLOAD May 13 06:55:02.734000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit: BPF prog-id=152 op=LOAD May 13 06:55:02.734000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdb19a8470 a2=74 a3=540051 items=0 ppid=3241 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:02.734000 audit: BPF prog-id=152 op=UNLOAD May 13 06:55:02.734000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit: BPF prog-id=153 op=LOAD May 13 06:55:02.734000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdb19a84a0 a2=94 a3=2 items=0 ppid=3241 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:02.734000 audit: BPF prog-id=153 op=UNLOAD May 13 06:55:02.734000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdb19a8370 a2=28 a3=0 items=0 ppid=3241 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb19a83a0 a2=28 a3=0 items=0 ppid=3241 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb19a82b0 a2=28 a3=0 items=0 ppid=3241 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdb19a83c0 a2=28 a3=0 items=0 ppid=3241 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdb19a83a0 a2=28 a3=0 items=0 ppid=3241 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdb19a8390 a2=28 a3=0 items=0 ppid=3241 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdb19a83c0 a2=28 a3=0 items=0 ppid=3241 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb19a83a0 a2=28 a3=0 items=0 ppid=3241 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb19a83c0 a2=28 a3=0 items=0 ppid=3241 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb19a8390 a2=28 a3=0 items=0 ppid=3241 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdb19a8400 a2=28 a3=0 items=0 ppid=3241 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.734000 audit: BPF prog-id=154 op=LOAD May 13 06:55:02.734000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdb19a8270 a2=40 a3=0 items=0 ppid=3241 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:02.734000 audit: BPF prog-id=154 op=UNLOAD May 13 06:55:02.735000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.735000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffdb19a8260 a2=50 a3=2800 items=0 ppid=3241 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.735000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:02.735000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.735000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffdb19a8260 a2=50 a3=2800 items=0 ppid=3241 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.735000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:02.735000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.735000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.735000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.735000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.735000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.735000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.735000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.735000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.735000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.735000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.735000 audit: BPF prog-id=155 op=LOAD May 13 06:55:02.735000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdb19a7a80 a2=94 a3=2 items=0 ppid=3241 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.735000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:02.735000 audit: BPF prog-id=155 op=UNLOAD May 13 06:55:02.735000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.735000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.735000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.735000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.735000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.735000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.735000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.735000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.735000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.735000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.735000 audit: BPF prog-id=156 op=LOAD May 13 06:55:02.735000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdb19a7b80 a2=94 a3=30 items=0 ppid=3241 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.735000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit: BPF prog-id=157 op=LOAD May 13 06:55:02.737000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc7cb00940 a2=98 a3=0 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.737000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.737000 audit: BPF prog-id=157 op=UNLOAD May 13 06:55:02.737000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit: BPF prog-id=158 op=LOAD May 13 06:55:02.737000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc7cb00720 a2=74 a3=540051 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.737000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.737000 audit: BPF prog-id=158 op=UNLOAD May 13 06:55:02.737000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.737000 audit: BPF prog-id=159 op=LOAD May 13 06:55:02.737000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc7cb00750 a2=94 a3=2 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.737000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.737000 audit: BPF prog-id=159 op=UNLOAD May 13 06:55:02.880000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.880000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.880000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.880000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.880000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.880000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.880000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.880000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.880000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.880000 audit: BPF prog-id=160 op=LOAD May 13 06:55:02.880000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc7cb00610 a2=40 a3=1 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.880000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.880000 audit: BPF prog-id=160 op=UNLOAD May 13 06:55:02.880000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.880000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc7cb006e0 a2=50 a3=7ffc7cb007c0 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.880000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.889000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.889000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7cb00620 a2=28 a3=0 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.889000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7cb00650 a2=28 a3=0 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.890000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7cb00560 a2=28 a3=0 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.890000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7cb00670 a2=28 a3=0 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.890000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7cb00650 a2=28 a3=0 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.890000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7cb00640 a2=28 a3=0 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.890000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7cb00670 a2=28 a3=0 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.890000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7cb00650 a2=28 a3=0 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.890000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7cb00670 a2=28 a3=0 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.890000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7cb00640 a2=28 a3=0 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.890000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7cb006b0 a2=28 a3=0 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.890000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc7cb00460 a2=50 a3=1 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.890000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit: BPF prog-id=161 op=LOAD May 13 06:55:02.890000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc7cb00460 a2=94 a3=5 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.890000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.890000 audit: BPF prog-id=161 op=UNLOAD May 13 06:55:02.890000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc7cb00510 a2=50 a3=1 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.890000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc7cb00630 a2=4 a3=38 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.890000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.890000 audit[3388]: AVC avc: denied { confidentiality } for pid=3388 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 06:55:02.890000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc7cb00680 a2=94 a3=6 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.890000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { confidentiality } for pid=3388 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 06:55:02.891000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc7caffe30 a2=94 a3=83 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.891000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { perfmon } for pid=3388 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { confidentiality } for pid=3388 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 06:55:02.891000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc7caffe30 a2=94 a3=83 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.891000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.891000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7cb01870 a2=10 a3=f0f1 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.891000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.891000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7cb01710 a2=10 a3=3 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.891000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.891000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7cb016b0 a2=10 a3=3 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.891000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.891000 audit[3388]: AVC avc: denied { bpf } for pid=3388 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:02.891000 audit[3388]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7cb016b0 a2=10 a3=7 items=0 ppid=3241 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.891000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:02.899000 audit: BPF prog-id=156 op=UNLOAD May 13 06:55:02.975000 audit[3418]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3418 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 06:55:02.975000 audit[3418]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff55c72a00 a2=0 a3=7fff55c729ec items=0 ppid=3241 pid=3418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.975000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 06:55:02.982000 audit[3416]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3416 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 06:55:02.982000 audit[3416]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffda9e04820 a2=0 a3=7ffda9e0480c items=0 ppid=3241 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.982000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 06:55:02.983000 audit[3415]: NETFILTER_CFG table=raw:99 family=2 entries=21 op=nft_register_chain pid=3415 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 06:55:02.983000 audit[3415]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc4178da20 a2=0 a3=7ffc4178da0c items=0 ppid=3241 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.983000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 06:55:02.988000 audit[3419]: NETFILTER_CFG table=filter:100 family=2 entries=69 op=nft_register_chain pid=3419 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 06:55:02.988000 audit[3419]: SYSCALL arch=c000003e syscall=46 success=yes exit=36404 a0=3 a1=7ffe24144ac0 a2=0 a3=7ffe24144aac items=0 ppid=3241 pid=3419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:02.988000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 06:55:03.208791 env[1155]: time="2025-05-13T06:55:03.208554026Z" level=info msg="StopPodSandbox for \"58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515\"" May 13 06:55:03.218034 env[1155]: time="2025-05-13T06:55:03.217263911Z" level=info msg="StopPodSandbox for \"b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224\"" May 13 06:55:03.222220 env[1155]: time="2025-05-13T06:55:03.222160617Z" level=info msg="StopPodSandbox for \"cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67\"" May 13 06:55:03.352246 systemd-networkd[971]: cali9ad80842375: Gained IPv6LL May 13 06:55:03.423681 env[1155]: 2025-05-13 06:55:03.325 [INFO][3476] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" May 13 06:55:03.423681 env[1155]: 2025-05-13 06:55:03.325 [INFO][3476] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" iface="eth0" netns="/var/run/netns/cni-f9da6bc4-1b4b-53dd-f6ee-5a6e83164c6e" May 13 06:55:03.423681 env[1155]: 2025-05-13 06:55:03.325 [INFO][3476] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" iface="eth0" netns="/var/run/netns/cni-f9da6bc4-1b4b-53dd-f6ee-5a6e83164c6e" May 13 06:55:03.423681 env[1155]: 2025-05-13 06:55:03.325 [INFO][3476] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" iface="eth0" netns="/var/run/netns/cni-f9da6bc4-1b4b-53dd-f6ee-5a6e83164c6e" May 13 06:55:03.423681 env[1155]: 2025-05-13 06:55:03.325 [INFO][3476] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" May 13 06:55:03.423681 env[1155]: 2025-05-13 06:55:03.325 [INFO][3476] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" May 13 06:55:03.423681 env[1155]: 2025-05-13 06:55:03.392 [INFO][3492] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" HandleID="k8s-pod-network.b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-eth0" May 13 06:55:03.423681 env[1155]: 2025-05-13 06:55:03.392 [INFO][3492] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:03.423681 env[1155]: 2025-05-13 06:55:03.392 [INFO][3492] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:03.423681 env[1155]: 2025-05-13 06:55:03.409 [WARNING][3492] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" HandleID="k8s-pod-network.b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-eth0" May 13 06:55:03.423681 env[1155]: 2025-05-13 06:55:03.409 [INFO][3492] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" HandleID="k8s-pod-network.b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-eth0" May 13 06:55:03.423681 env[1155]: 2025-05-13 06:55:03.419 [INFO][3492] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:03.423681 env[1155]: 2025-05-13 06:55:03.422 [INFO][3476] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" May 13 06:55:03.427393 systemd[1]: run-netns-cni\x2df9da6bc4\x2d1b4b\x2d53dd\x2df6ee\x2d5a6e83164c6e.mount: Deactivated successfully. May 13 06:55:03.429637 env[1155]: time="2025-05-13T06:55:03.429576075Z" level=info msg="TearDown network for sandbox \"b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224\" successfully" May 13 06:55:03.429752 env[1155]: time="2025-05-13T06:55:03.429729671Z" level=info msg="StopPodSandbox for \"b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224\" returns successfully" May 13 06:55:03.432260 env[1155]: time="2025-05-13T06:55:03.432213308Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-6jrqx,Uid:a7244bdd-6814-4742-bcde-9ccc6e210d60,Namespace:kube-system,Attempt:1,}" May 13 06:55:03.503425 env[1155]: 2025-05-13 06:55:03.383 [INFO][3474] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" May 13 06:55:03.503425 env[1155]: 2025-05-13 06:55:03.383 [INFO][3474] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" iface="eth0" netns="/var/run/netns/cni-40aedd60-2116-024b-48d8-40399b353982" May 13 06:55:03.503425 env[1155]: 2025-05-13 06:55:03.383 [INFO][3474] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" iface="eth0" netns="/var/run/netns/cni-40aedd60-2116-024b-48d8-40399b353982" May 13 06:55:03.503425 env[1155]: 2025-05-13 06:55:03.383 [INFO][3474] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" iface="eth0" netns="/var/run/netns/cni-40aedd60-2116-024b-48d8-40399b353982" May 13 06:55:03.503425 env[1155]: 2025-05-13 06:55:03.383 [INFO][3474] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" May 13 06:55:03.503425 env[1155]: 2025-05-13 06:55:03.383 [INFO][3474] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" May 13 06:55:03.503425 env[1155]: 2025-05-13 06:55:03.469 [INFO][3504] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" HandleID="k8s-pod-network.58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-eth0" May 13 06:55:03.503425 env[1155]: 2025-05-13 06:55:03.469 [INFO][3504] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:03.503425 env[1155]: 2025-05-13 06:55:03.469 [INFO][3504] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:03.503425 env[1155]: 2025-05-13 06:55:03.493 [WARNING][3504] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" HandleID="k8s-pod-network.58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-eth0" May 13 06:55:03.503425 env[1155]: 2025-05-13 06:55:03.493 [INFO][3504] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" HandleID="k8s-pod-network.58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-eth0" May 13 06:55:03.503425 env[1155]: 2025-05-13 06:55:03.495 [INFO][3504] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:03.503425 env[1155]: 2025-05-13 06:55:03.496 [INFO][3474] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" May 13 06:55:03.503425 env[1155]: time="2025-05-13T06:55:03.500624503Z" level=info msg="TearDown network for sandbox \"58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515\" successfully" May 13 06:55:03.503425 env[1155]: time="2025-05-13T06:55:03.500659963Z" level=info msg="StopPodSandbox for \"58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515\" returns successfully" May 13 06:55:03.503095 systemd[1]: run-netns-cni\x2d40aedd60\x2d2116\x2d024b\x2d48d8\x2d40399b353982.mount: Deactivated successfully. May 13 06:55:03.505450 env[1155]: time="2025-05-13T06:55:03.505409433Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-777cz,Uid:e974b640-4ca2-42b9-a109-947d123327d0,Namespace:kube-system,Attempt:1,}" May 13 06:55:03.523480 env[1155]: 2025-05-13 06:55:03.374 [INFO][3475] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" May 13 06:55:03.523480 env[1155]: 2025-05-13 06:55:03.374 [INFO][3475] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" iface="eth0" netns="/var/run/netns/cni-71c72a3d-0473-e577-90bd-f84f53acb5f9" May 13 06:55:03.523480 env[1155]: 2025-05-13 06:55:03.374 [INFO][3475] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" iface="eth0" netns="/var/run/netns/cni-71c72a3d-0473-e577-90bd-f84f53acb5f9" May 13 06:55:03.523480 env[1155]: 2025-05-13 06:55:03.374 [INFO][3475] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" iface="eth0" netns="/var/run/netns/cni-71c72a3d-0473-e577-90bd-f84f53acb5f9" May 13 06:55:03.523480 env[1155]: 2025-05-13 06:55:03.374 [INFO][3475] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" May 13 06:55:03.523480 env[1155]: 2025-05-13 06:55:03.374 [INFO][3475] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" May 13 06:55:03.523480 env[1155]: 2025-05-13 06:55:03.483 [INFO][3498] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" HandleID="k8s-pod-network.cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-eth0" May 13 06:55:03.523480 env[1155]: 2025-05-13 06:55:03.483 [INFO][3498] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:03.523480 env[1155]: 2025-05-13 06:55:03.495 [INFO][3498] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:03.523480 env[1155]: 2025-05-13 06:55:03.511 [WARNING][3498] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" HandleID="k8s-pod-network.cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-eth0" May 13 06:55:03.523480 env[1155]: 2025-05-13 06:55:03.511 [INFO][3498] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" HandleID="k8s-pod-network.cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-eth0" May 13 06:55:03.523480 env[1155]: 2025-05-13 06:55:03.516 [INFO][3498] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:03.523480 env[1155]: 2025-05-13 06:55:03.521 [INFO][3475] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" May 13 06:55:03.529782 env[1155]: time="2025-05-13T06:55:03.529747093Z" level=info msg="TearDown network for sandbox \"cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67\" successfully" May 13 06:55:03.529960 env[1155]: time="2025-05-13T06:55:03.529902082Z" level=info msg="StopPodSandbox for \"cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67\" returns successfully" May 13 06:55:03.531358 systemd[1]: run-netns-cni\x2d71c72a3d\x2d0473\x2de577\x2d90bd\x2df84f53acb5f9.mount: Deactivated successfully. May 13 06:55:03.535299 env[1155]: time="2025-05-13T06:55:03.534836322Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-fbfdb4f49-tw2jz,Uid:59af98d4-a46a-486a-ae5b-da7f7fb98080,Namespace:calico-apiserver,Attempt:1,}" May 13 06:55:03.856014 systemd-networkd[971]: cali558875d5c2d: Link UP May 13 06:55:03.864478 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 06:55:03.864582 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali558875d5c2d: link becomes ready May 13 06:55:03.864687 systemd-networkd[971]: cali558875d5c2d: Gained carrier May 13 06:55:03.881881 env[1155]: 2025-05-13 06:55:03.677 [INFO][3519] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-eth0 coredns-668d6bf9bc- kube-system a7244bdd-6814-4742-bcde-9ccc6e210d60 807 0 2025-05-13 06:54:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-7-n-7f05b50207.novalocal coredns-668d6bf9bc-6jrqx eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali558875d5c2d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447" Namespace="kube-system" Pod="coredns-668d6bf9bc-6jrqx" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-" May 13 06:55:03.881881 env[1155]: 2025-05-13 06:55:03.677 [INFO][3519] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447" Namespace="kube-system" Pod="coredns-668d6bf9bc-6jrqx" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-eth0" May 13 06:55:03.881881 env[1155]: 2025-05-13 06:55:03.790 [INFO][3549] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447" HandleID="k8s-pod-network.058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-eth0" May 13 06:55:03.881881 env[1155]: 2025-05-13 06:55:03.801 [INFO][3549] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447" HandleID="k8s-pod-network.058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051390), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-7-n-7f05b50207.novalocal", "pod":"coredns-668d6bf9bc-6jrqx", "timestamp":"2025-05-13 06:55:03.790873969 +0000 UTC"}, Hostname:"ci-3510-3-7-n-7f05b50207.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 06:55:03.881881 env[1155]: 2025-05-13 06:55:03.801 [INFO][3549] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:03.881881 env[1155]: 2025-05-13 06:55:03.801 [INFO][3549] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:03.881881 env[1155]: 2025-05-13 06:55:03.801 [INFO][3549] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-7f05b50207.novalocal' May 13 06:55:03.881881 env[1155]: 2025-05-13 06:55:03.803 [INFO][3549] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:03.881881 env[1155]: 2025-05-13 06:55:03.807 [INFO][3549] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:03.881881 env[1155]: 2025-05-13 06:55:03.812 [INFO][3549] ipam/ipam.go 489: Trying affinity for 192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:03.881881 env[1155]: 2025-05-13 06:55:03.814 [INFO][3549] ipam/ipam.go 155: Attempting to load block cidr=192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:03.881881 env[1155]: 2025-05-13 06:55:03.816 [INFO][3549] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:03.881881 env[1155]: 2025-05-13 06:55:03.816 [INFO][3549] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.0/26 handle="k8s-pod-network.058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:03.881881 env[1155]: 2025-05-13 06:55:03.822 [INFO][3549] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447 May 13 06:55:03.881881 env[1155]: 2025-05-13 06:55:03.828 [INFO][3549] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.20.0/26 handle="k8s-pod-network.058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:03.881881 env[1155]: 2025-05-13 06:55:03.842 [INFO][3549] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.20.2/26] block=192.168.20.0/26 handle="k8s-pod-network.058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:03.881881 env[1155]: 2025-05-13 06:55:03.842 [INFO][3549] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.2/26] handle="k8s-pod-network.058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:03.881881 env[1155]: 2025-05-13 06:55:03.842 [INFO][3549] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:03.881881 env[1155]: 2025-05-13 06:55:03.842 [INFO][3549] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.20.2/26] IPv6=[] ContainerID="058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447" HandleID="k8s-pod-network.058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-eth0" May 13 06:55:03.882712 env[1155]: 2025-05-13 06:55:03.844 [INFO][3519] cni-plugin/k8s.go 386: Populated endpoint ContainerID="058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447" Namespace="kube-system" Pod="coredns-668d6bf9bc-6jrqx" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"a7244bdd-6814-4742-bcde-9ccc6e210d60", ResourceVersion:"807", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"", Pod:"coredns-668d6bf9bc-6jrqx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.20.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali558875d5c2d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:03.882712 env[1155]: 2025-05-13 06:55:03.844 [INFO][3519] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.20.2/32] ContainerID="058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447" Namespace="kube-system" Pod="coredns-668d6bf9bc-6jrqx" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-eth0" May 13 06:55:03.882712 env[1155]: 2025-05-13 06:55:03.844 [INFO][3519] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali558875d5c2d ContainerID="058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447" Namespace="kube-system" Pod="coredns-668d6bf9bc-6jrqx" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-eth0" May 13 06:55:03.882712 env[1155]: 2025-05-13 06:55:03.866 [INFO][3519] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447" Namespace="kube-system" Pod="coredns-668d6bf9bc-6jrqx" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-eth0" May 13 06:55:03.882712 env[1155]: 2025-05-13 06:55:03.866 [INFO][3519] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447" Namespace="kube-system" Pod="coredns-668d6bf9bc-6jrqx" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"a7244bdd-6814-4742-bcde-9ccc6e210d60", ResourceVersion:"807", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447", Pod:"coredns-668d6bf9bc-6jrqx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.20.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali558875d5c2d", MAC:"f2:c3:83:e9:0c:61", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:03.882712 env[1155]: 2025-05-13 06:55:03.879 [INFO][3519] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447" Namespace="kube-system" Pod="coredns-668d6bf9bc-6jrqx" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-eth0" May 13 06:55:03.901202 env[1155]: time="2025-05-13T06:55:03.900059110Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 06:55:03.901202 env[1155]: time="2025-05-13T06:55:03.900202940Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 06:55:03.901202 env[1155]: time="2025-05-13T06:55:03.900228613Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 06:55:03.903201 env[1155]: time="2025-05-13T06:55:03.902278826Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447 pid=3591 runtime=io.containerd.runc.v2 May 13 06:55:03.940666 systemd[1]: Started cri-containerd-058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447.scope. May 13 06:55:03.963682 systemd-networkd[971]: cali0191a535426: Link UP May 13 06:55:03.974407 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0191a535426: link becomes ready May 13 06:55:03.968446 systemd-networkd[971]: cali0191a535426: Gained carrier May 13 06:55:03.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.976000 audit: BPF prog-id=162 op=LOAD May 13 06:55:03.977000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3591 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:03.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035386639353236656463336163626234613766313039613465313237 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3591 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:03.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035386639353236656463336163626234613766313039613465313237 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit: BPF prog-id=163 op=LOAD May 13 06:55:03.977000 audit[3601]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002233f0 items=0 ppid=3591 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:03.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035386639353236656463336163626234613766313039613465313237 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit: BPF prog-id=164 op=LOAD May 13 06:55:03.977000 audit[3601]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000223438 items=0 ppid=3591 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:03.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035386639353236656463336163626234613766313039613465313237 May 13 06:55:03.977000 audit: BPF prog-id=164 op=UNLOAD May 13 06:55:03.977000 audit: BPF prog-id=163 op=UNLOAD May 13 06:55:03.977000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:03.977000 audit: BPF prog-id=165 op=LOAD May 13 06:55:03.977000 audit[3601]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000223848 items=0 ppid=3591 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:03.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035386639353236656463336163626234613766313039613465313237 May 13 06:55:03.983000 audit[3613]: NETFILTER_CFG table=filter:101 family=2 entries=38 op=nft_register_chain pid=3613 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 06:55:03.983000 audit[3613]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffc908e5e50 a2=0 a3=7ffc908e5e3c items=0 ppid=3241 pid=3613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:03.983000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 06:55:03.990635 env[1155]: 2025-05-13 06:55:03.753 [INFO][3532] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-eth0 calico-apiserver-fbfdb4f49- calico-apiserver 59af98d4-a46a-486a-ae5b-da7f7fb98080 808 0 2025-05-13 06:54:32 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:fbfdb4f49 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-7-n-7f05b50207.novalocal calico-apiserver-fbfdb4f49-tw2jz eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali0191a535426 [] []}} ContainerID="871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e" Namespace="calico-apiserver" Pod="calico-apiserver-fbfdb4f49-tw2jz" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-" May 13 06:55:03.990635 env[1155]: 2025-05-13 06:55:03.753 [INFO][3532] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e" Namespace="calico-apiserver" Pod="calico-apiserver-fbfdb4f49-tw2jz" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-eth0" May 13 06:55:03.990635 env[1155]: 2025-05-13 06:55:03.877 [INFO][3561] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e" HandleID="k8s-pod-network.871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-eth0" May 13 06:55:03.990635 env[1155]: 2025-05-13 06:55:03.904 [INFO][3561] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e" HandleID="k8s-pod-network.871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001fe6b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-7-n-7f05b50207.novalocal", "pod":"calico-apiserver-fbfdb4f49-tw2jz", "timestamp":"2025-05-13 06:55:03.877010152 +0000 UTC"}, Hostname:"ci-3510-3-7-n-7f05b50207.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 06:55:03.990635 env[1155]: 2025-05-13 06:55:03.904 [INFO][3561] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:03.990635 env[1155]: 2025-05-13 06:55:03.904 [INFO][3561] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:03.990635 env[1155]: 2025-05-13 06:55:03.904 [INFO][3561] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-7f05b50207.novalocal' May 13 06:55:03.990635 env[1155]: 2025-05-13 06:55:03.907 [INFO][3561] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:03.990635 env[1155]: 2025-05-13 06:55:03.912 [INFO][3561] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:03.990635 env[1155]: 2025-05-13 06:55:03.920 [INFO][3561] ipam/ipam.go 489: Trying affinity for 192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:03.990635 env[1155]: 2025-05-13 06:55:03.923 [INFO][3561] ipam/ipam.go 155: Attempting to load block cidr=192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:03.990635 env[1155]: 2025-05-13 06:55:03.925 [INFO][3561] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:03.990635 env[1155]: 2025-05-13 06:55:03.925 [INFO][3561] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.0/26 handle="k8s-pod-network.871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:03.990635 env[1155]: 2025-05-13 06:55:03.927 [INFO][3561] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e May 13 06:55:03.990635 env[1155]: 2025-05-13 06:55:03.933 [INFO][3561] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.20.0/26 handle="k8s-pod-network.871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:03.990635 env[1155]: 2025-05-13 06:55:03.946 [INFO][3561] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.20.3/26] block=192.168.20.0/26 handle="k8s-pod-network.871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:03.990635 env[1155]: 2025-05-13 06:55:03.946 [INFO][3561] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.3/26] handle="k8s-pod-network.871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:03.990635 env[1155]: 2025-05-13 06:55:03.946 [INFO][3561] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:03.990635 env[1155]: 2025-05-13 06:55:03.946 [INFO][3561] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.20.3/26] IPv6=[] ContainerID="871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e" HandleID="k8s-pod-network.871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-eth0" May 13 06:55:03.991439 env[1155]: 2025-05-13 06:55:03.948 [INFO][3532] cni-plugin/k8s.go 386: Populated endpoint ContainerID="871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e" Namespace="calico-apiserver" Pod="calico-apiserver-fbfdb4f49-tw2jz" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-eth0", GenerateName:"calico-apiserver-fbfdb4f49-", Namespace:"calico-apiserver", SelfLink:"", UID:"59af98d4-a46a-486a-ae5b-da7f7fb98080", ResourceVersion:"808", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"fbfdb4f49", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"", Pod:"calico-apiserver-fbfdb4f49-tw2jz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.20.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0191a535426", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:03.991439 env[1155]: 2025-05-13 06:55:03.948 [INFO][3532] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.20.3/32] ContainerID="871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e" Namespace="calico-apiserver" Pod="calico-apiserver-fbfdb4f49-tw2jz" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-eth0" May 13 06:55:03.991439 env[1155]: 2025-05-13 06:55:03.948 [INFO][3532] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0191a535426 ContainerID="871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e" Namespace="calico-apiserver" Pod="calico-apiserver-fbfdb4f49-tw2jz" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-eth0" May 13 06:55:03.991439 env[1155]: 2025-05-13 06:55:03.969 [INFO][3532] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e" Namespace="calico-apiserver" Pod="calico-apiserver-fbfdb4f49-tw2jz" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-eth0" May 13 06:55:03.991439 env[1155]: 2025-05-13 06:55:03.969 [INFO][3532] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e" Namespace="calico-apiserver" Pod="calico-apiserver-fbfdb4f49-tw2jz" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-eth0", GenerateName:"calico-apiserver-fbfdb4f49-", Namespace:"calico-apiserver", SelfLink:"", UID:"59af98d4-a46a-486a-ae5b-da7f7fb98080", ResourceVersion:"808", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"fbfdb4f49", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e", Pod:"calico-apiserver-fbfdb4f49-tw2jz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.20.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0191a535426", MAC:"de:ce:45:b6:61:c5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:03.991439 env[1155]: 2025-05-13 06:55:03.989 [INFO][3532] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e" Namespace="calico-apiserver" Pod="calico-apiserver-fbfdb4f49-tw2jz" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-eth0" May 13 06:55:04.010846 env[1155]: time="2025-05-13T06:55:04.010739600Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 06:55:04.010846 env[1155]: time="2025-05-13T06:55:04.010782752Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 06:55:04.011054 env[1155]: time="2025-05-13T06:55:04.010815837Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 06:55:04.011054 env[1155]: time="2025-05-13T06:55:04.010983558Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e pid=3642 runtime=io.containerd.runc.v2 May 13 06:55:04.056101 systemd-networkd[971]: vxlan.calico: Gained IPv6LL May 13 06:55:04.078000 audit[3659]: NETFILTER_CFG table=filter:102 family=2 entries=48 op=nft_register_chain pid=3659 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 06:55:04.084426 env[1155]: time="2025-05-13T06:55:04.084391776Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-6jrqx,Uid:a7244bdd-6814-4742-bcde-9ccc6e210d60,Namespace:kube-system,Attempt:1,} returns sandbox id \"058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447\"" May 13 06:55:04.078000 audit[3659]: SYSCALL arch=c000003e syscall=46 success=yes exit=25868 a0=3 a1=7fffc0c46c10 a2=0 a3=7fffc0c46bfc items=0 ppid=3241 pid=3659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.078000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 06:55:04.114493 env[1155]: time="2025-05-13T06:55:04.110196240Z" level=info msg="CreateContainer within sandbox \"058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 13 06:55:04.118415 systemd-networkd[971]: cali04e15ee1982: Link UP May 13 06:55:04.121350 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali04e15ee1982: link becomes ready May 13 06:55:04.120761 systemd-networkd[971]: cali04e15ee1982: Gained carrier May 13 06:55:04.125859 systemd[1]: Started cri-containerd-871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e.scope. May 13 06:55:04.142731 env[1155]: 2025-05-13 06:55:03.712 [INFO][3514] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-eth0 coredns-668d6bf9bc- kube-system e974b640-4ca2-42b9-a109-947d123327d0 809 0 2025-05-13 06:54:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-7-n-7f05b50207.novalocal coredns-668d6bf9bc-777cz eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali04e15ee1982 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67" Namespace="kube-system" Pod="coredns-668d6bf9bc-777cz" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-" May 13 06:55:04.142731 env[1155]: 2025-05-13 06:55:03.713 [INFO][3514] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67" Namespace="kube-system" Pod="coredns-668d6bf9bc-777cz" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-eth0" May 13 06:55:04.142731 env[1155]: 2025-05-13 06:55:03.831 [INFO][3556] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67" HandleID="k8s-pod-network.b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-eth0" May 13 06:55:04.142731 env[1155]: 2025-05-13 06:55:03.904 [INFO][3556] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67" HandleID="k8s-pod-network.b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031aa50), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-7-n-7f05b50207.novalocal", "pod":"coredns-668d6bf9bc-777cz", "timestamp":"2025-05-13 06:55:03.831195059 +0000 UTC"}, Hostname:"ci-3510-3-7-n-7f05b50207.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 06:55:04.142731 env[1155]: 2025-05-13 06:55:03.905 [INFO][3556] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:04.142731 env[1155]: 2025-05-13 06:55:03.946 [INFO][3556] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:04.142731 env[1155]: 2025-05-13 06:55:03.946 [INFO][3556] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-7f05b50207.novalocal' May 13 06:55:04.142731 env[1155]: 2025-05-13 06:55:04.015 [INFO][3556] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:04.142731 env[1155]: 2025-05-13 06:55:04.024 [INFO][3556] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:04.142731 env[1155]: 2025-05-13 06:55:04.040 [INFO][3556] ipam/ipam.go 489: Trying affinity for 192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:04.142731 env[1155]: 2025-05-13 06:55:04.048 [INFO][3556] ipam/ipam.go 155: Attempting to load block cidr=192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:04.142731 env[1155]: 2025-05-13 06:55:04.052 [INFO][3556] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:04.142731 env[1155]: 2025-05-13 06:55:04.052 [INFO][3556] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.0/26 handle="k8s-pod-network.b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:04.142731 env[1155]: 2025-05-13 06:55:04.055 [INFO][3556] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67 May 13 06:55:04.142731 env[1155]: 2025-05-13 06:55:04.082 [INFO][3556] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.20.0/26 handle="k8s-pod-network.b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:04.142731 env[1155]: 2025-05-13 06:55:04.093 [INFO][3556] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.20.4/26] block=192.168.20.0/26 handle="k8s-pod-network.b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:04.142731 env[1155]: 2025-05-13 06:55:04.094 [INFO][3556] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.4/26] handle="k8s-pod-network.b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:04.142731 env[1155]: 2025-05-13 06:55:04.094 [INFO][3556] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:04.142731 env[1155]: 2025-05-13 06:55:04.094 [INFO][3556] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.20.4/26] IPv6=[] ContainerID="b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67" HandleID="k8s-pod-network.b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-eth0" May 13 06:55:04.144211 env[1155]: 2025-05-13 06:55:04.096 [INFO][3514] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67" Namespace="kube-system" Pod="coredns-668d6bf9bc-777cz" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"e974b640-4ca2-42b9-a109-947d123327d0", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"", Pod:"coredns-668d6bf9bc-777cz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.20.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali04e15ee1982", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:04.144211 env[1155]: 2025-05-13 06:55:04.096 [INFO][3514] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.20.4/32] ContainerID="b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67" Namespace="kube-system" Pod="coredns-668d6bf9bc-777cz" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-eth0" May 13 06:55:04.144211 env[1155]: 2025-05-13 06:55:04.096 [INFO][3514] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali04e15ee1982 ContainerID="b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67" Namespace="kube-system" Pod="coredns-668d6bf9bc-777cz" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-eth0" May 13 06:55:04.144211 env[1155]: 2025-05-13 06:55:04.120 [INFO][3514] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67" Namespace="kube-system" Pod="coredns-668d6bf9bc-777cz" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-eth0" May 13 06:55:04.144211 env[1155]: 2025-05-13 06:55:04.121 [INFO][3514] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67" Namespace="kube-system" Pod="coredns-668d6bf9bc-777cz" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"e974b640-4ca2-42b9-a109-947d123327d0", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67", Pod:"coredns-668d6bf9bc-777cz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.20.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali04e15ee1982", MAC:"c6:0c:7c:8e:9f:f9", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:04.144211 env[1155]: 2025-05-13 06:55:04.138 [INFO][3514] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67" Namespace="kube-system" Pod="coredns-668d6bf9bc-777cz" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-eth0" May 13 06:55:04.155000 audit[3683]: NETFILTER_CFG table=filter:103 family=2 entries=44 op=nft_register_chain pid=3683 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 06:55:04.155000 audit[3683]: SYSCALL arch=c000003e syscall=46 success=yes exit=22260 a0=3 a1=7ffc9306ed90 a2=0 a3=7ffc9306ed7c items=0 ppid=3241 pid=3683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.155000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 06:55:04.158705 env[1155]: time="2025-05-13T06:55:04.158667849Z" level=info msg="CreateContainer within sandbox \"058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"961aad2b19a9556a8d72a05c6c5b9f706671cd13f18d3d10e5d7ba4b98b81f97\"" May 13 06:55:04.161584 env[1155]: time="2025-05-13T06:55:04.160076079Z" level=info msg="StartContainer for \"961aad2b19a9556a8d72a05c6c5b9f706671cd13f18d3d10e5d7ba4b98b81f97\"" May 13 06:55:04.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.174000 audit: BPF prog-id=166 op=LOAD May 13 06:55:04.176000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.176000 audit[3653]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3642 pid=3653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837316139643538643934656339613231323762633139656439326334 May 13 06:55:04.176000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.176000 audit[3653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3642 pid=3653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837316139643538643934656339613231323762633139656439326334 May 13 06:55:04.176000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.176000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.176000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.176000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.176000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.176000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.176000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.176000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.176000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.176000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.176000 audit: BPF prog-id=167 op=LOAD May 13 06:55:04.176000 audit[3653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002801d0 items=0 ppid=3642 pid=3653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837316139643538643934656339613231323762633139656439326334 May 13 06:55:04.177000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.177000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.177000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.177000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.177000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.177000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.177000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.177000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.177000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.177000 audit: BPF prog-id=168 op=LOAD May 13 06:55:04.177000 audit[3653]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000280218 items=0 ppid=3642 pid=3653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837316139643538643934656339613231323762633139656439326334 May 13 06:55:04.178000 audit: BPF prog-id=168 op=UNLOAD May 13 06:55:04.179000 audit: BPF prog-id=167 op=UNLOAD May 13 06:55:04.179000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.179000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.179000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.179000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.179000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.179000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.179000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.179000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.179000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.179000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.179000 audit: BPF prog-id=169 op=LOAD May 13 06:55:04.179000 audit[3653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000280628 items=0 ppid=3642 pid=3653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837316139643538643934656339613231323762633139656439326334 May 13 06:55:04.216675 systemd[1]: Started cri-containerd-961aad2b19a9556a8d72a05c6c5b9f706671cd13f18d3d10e5d7ba4b98b81f97.scope. May 13 06:55:04.223563 env[1155]: time="2025-05-13T06:55:04.223526960Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-fbfdb4f49-tw2jz,Uid:59af98d4-a46a-486a-ae5b-da7f7fb98080,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e\"" May 13 06:55:04.230785 env[1155]: time="2025-05-13T06:55:04.230417678Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 06:55:04.230785 env[1155]: time="2025-05-13T06:55:04.230750285Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 06:55:04.231178 env[1155]: time="2025-05-13T06:55:04.230765661Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 06:55:04.231272 env[1155]: time="2025-05-13T06:55:04.231219181Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67 pid=3720 runtime=io.containerd.runc.v2 May 13 06:55:04.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.237000 audit: BPF prog-id=170 op=LOAD May 13 06:55:04.238000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.238000 audit[3699]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3591 pid=3699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936316161643262313961393535366138643732613035633663356239 May 13 06:55:04.238000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.238000 audit[3699]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3591 pid=3699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936316161643262313961393535366138643732613035633663356239 May 13 06:55:04.238000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.238000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.238000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.238000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.238000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.238000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.238000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.238000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.238000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.238000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.238000 audit: BPF prog-id=171 op=LOAD May 13 06:55:04.238000 audit[3699]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000392570 items=0 ppid=3591 pid=3699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936316161643262313961393535366138643732613035633663356239 May 13 06:55:04.240000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.240000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.240000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.240000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.240000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.240000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.240000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.240000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.240000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.240000 audit: BPF prog-id=172 op=LOAD May 13 06:55:04.240000 audit[3699]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003925b8 items=0 ppid=3591 pid=3699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936316161643262313961393535366138643732613035633663356239 May 13 06:55:04.241000 audit: BPF prog-id=172 op=UNLOAD May 13 06:55:04.241000 audit: BPF prog-id=171 op=UNLOAD May 13 06:55:04.241000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.241000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.241000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.241000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.241000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.241000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.241000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.241000 audit[3699]: AVC avc: denied { perfmon } for pid=3699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.241000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.241000 audit[3699]: AVC avc: denied { bpf } for pid=3699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.241000 audit: BPF prog-id=173 op=LOAD May 13 06:55:04.241000 audit[3699]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003929c8 items=0 ppid=3591 pid=3699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936316161643262313961393535366138643732613035633663356239 May 13 06:55:04.258778 systemd[1]: Started cri-containerd-b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67.scope. May 13 06:55:04.272446 env[1155]: time="2025-05-13T06:55:04.272410830Z" level=info msg="StartContainer for \"961aad2b19a9556a8d72a05c6c5b9f706671cd13f18d3d10e5d7ba4b98b81f97\" returns successfully" May 13 06:55:04.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.277000 audit: BPF prog-id=174 op=LOAD May 13 06:55:04.277000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.277000 audit[3745]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3720 pid=3745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235616339666364363535636466616266303639356330306463363363 May 13 06:55:04.278000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.278000 audit[3745]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3720 pid=3745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235616339666364363535636466616266303639356330306463363363 May 13 06:55:04.278000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.278000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.278000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.278000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.278000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.278000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.278000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.278000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.278000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.278000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.278000 audit: BPF prog-id=175 op=LOAD May 13 06:55:04.278000 audit[3745]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002f4860 items=0 ppid=3720 pid=3745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235616339666364363535636466616266303639356330306463363363 May 13 06:55:04.279000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.279000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.279000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.279000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.279000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.279000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.279000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.279000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.279000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.279000 audit: BPF prog-id=176 op=LOAD May 13 06:55:04.279000 audit[3745]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002f48a8 items=0 ppid=3720 pid=3745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235616339666364363535636466616266303639356330306463363363 May 13 06:55:04.280000 audit: BPF prog-id=176 op=UNLOAD May 13 06:55:04.280000 audit: BPF prog-id=175 op=UNLOAD May 13 06:55:04.280000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.280000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.280000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.280000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.280000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.280000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.280000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.280000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.280000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.280000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.280000 audit: BPF prog-id=177 op=LOAD May 13 06:55:04.280000 audit[3745]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002f4cb8 items=0 ppid=3720 pid=3745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235616339666364363535636466616266303639356330306463363363 May 13 06:55:04.308000 audit[3732]: AVC avc: denied { getattr } for pid=3732 comm="coredns" path="cgroup:[4026532672]" dev="nsfs" ino=4026532672 scontext=system_u:system_r:svirt_lxc_net_t:s0:c293,c835 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 13 06:55:04.308000 audit[3732]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c000058a38 a2=c0000c4ed8 a3=0 items=0 ppid=3591 pid=3732 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c293,c835 key=(null) May 13 06:55:04.308000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 13 06:55:04.360599 env[1155]: time="2025-05-13T06:55:04.360558359Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-777cz,Uid:e974b640-4ca2-42b9-a109-947d123327d0,Namespace:kube-system,Attempt:1,} returns sandbox id \"b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67\"" May 13 06:55:04.365225 env[1155]: time="2025-05-13T06:55:04.365142992Z" level=info msg="CreateContainer within sandbox \"b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 13 06:55:04.415573 env[1155]: time="2025-05-13T06:55:04.415522108Z" level=info msg="CreateContainer within sandbox \"b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"cebf2b209accda026c61e15c23c0d275d8cd457e8e23f7004fe2907529682653\"" May 13 06:55:04.416328 env[1155]: time="2025-05-13T06:55:04.416309367Z" level=info msg="StartContainer for \"cebf2b209accda026c61e15c23c0d275d8cd457e8e23f7004fe2907529682653\"" May 13 06:55:04.478835 systemd[1]: Started cri-containerd-cebf2b209accda026c61e15c23c0d275d8cd457e8e23f7004fe2907529682653.scope. May 13 06:55:04.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.519000 audit: BPF prog-id=178 op=LOAD May 13 06:55:04.520000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.520000 audit[3788]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3720 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365626632623230396163636461303236633631653135633233633064 May 13 06:55:04.520000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.520000 audit[3788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3720 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365626632623230396163636461303236633631653135633233633064 May 13 06:55:04.520000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.520000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.520000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.520000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.520000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.520000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.520000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.520000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.520000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.520000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.520000 audit: BPF prog-id=179 op=LOAD May 13 06:55:04.520000 audit[3788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0000243e0 items=0 ppid=3720 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365626632623230396163636461303236633631653135633233633064 May 13 06:55:04.521000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.521000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.521000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.521000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.521000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.521000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.521000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.521000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.521000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.521000 audit: BPF prog-id=180 op=LOAD May 13 06:55:04.521000 audit[3788]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000024428 items=0 ppid=3720 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365626632623230396163636461303236633631653135633233633064 May 13 06:55:04.522000 audit: BPF prog-id=180 op=UNLOAD May 13 06:55:04.522000 audit: BPF prog-id=179 op=UNLOAD May 13 06:55:04.522000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.522000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.522000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.522000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.522000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.522000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.522000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.522000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.522000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.522000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.522000 audit: BPF prog-id=181 op=LOAD May 13 06:55:04.522000 audit[3788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000024838 items=0 ppid=3720 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365626632623230396163636461303236633631653135633233633064 May 13 06:55:04.542000 audit[3806]: NETFILTER_CFG table=filter:104 family=2 entries=16 op=nft_register_rule pid=3806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:04.542000 audit[3806]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc8af2fb50 a2=0 a3=7ffc8af2fb3c items=0 ppid=2110 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.542000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:04.548000 audit[3806]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=3806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:04.548000 audit[3806]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc8af2fb50 a2=0 a3=0 items=0 ppid=2110 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.548000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:04.564613 env[1155]: time="2025-05-13T06:55:04.563723245Z" level=info msg="StartContainer for \"cebf2b209accda026c61e15c23c0d275d8cd457e8e23f7004fe2907529682653\" returns successfully" May 13 06:55:04.565000 audit[3799]: AVC avc: denied { getattr } for pid=3799 comm="coredns" path="cgroup:[4026532679]" dev="nsfs" ino=4026532679 scontext=system_u:system_r:svirt_lxc_net_t:s0:c528,c943 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 13 06:55:04.565000 audit[3799]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c000058a38 a2=c00043efa8 a3=0 items=0 ppid=3720 pid=3799 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c528,c943 key=(null) May 13 06:55:04.565000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 13 06:55:04.583345 kubelet[1935]: I0513 06:55:04.583052 1935 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-6jrqx" podStartSLOduration=40.583035719 podStartE2EDuration="40.583035719s" podCreationTimestamp="2025-05-13 06:54:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 06:55:04.496704264 +0000 UTC m=+46.424081657" watchObservedRunningTime="2025-05-13 06:55:04.583035719 +0000 UTC m=+46.510413112" May 13 06:55:04.652000 audit[3821]: NETFILTER_CFG table=filter:106 family=2 entries=13 op=nft_register_rule pid=3821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:04.652000 audit[3821]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe80934a00 a2=0 a3=7ffe809349ec items=0 ppid=2110 pid=3821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.652000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:04.658000 audit[3821]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=3821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:04.658000 audit[3821]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe80934a00 a2=0 a3=7ffe809349ec items=0 ppid=2110 pid=3821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.658000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:04.671100 env[1155]: time="2025-05-13T06:55:04.671055763Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:04.673720 env[1155]: time="2025-05-13T06:55:04.673692252Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:04.678090 env[1155]: time="2025-05-13T06:55:04.678060312Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:04.680590 env[1155]: time="2025-05-13T06:55:04.680564028Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:04.681100 env[1155]: time="2025-05-13T06:55:04.681074223Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 13 06:55:04.682961 env[1155]: time="2025-05-13T06:55:04.682906182Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 13 06:55:04.683901 env[1155]: time="2025-05-13T06:55:04.683866231Z" level=info msg="CreateContainer within sandbox \"592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 13 06:55:04.717902 env[1155]: time="2025-05-13T06:55:04.717854108Z" level=info msg="CreateContainer within sandbox \"592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"2eda69deadb77780673ad0cfdd21265d7f92ab3617fc947a8bd983149d522bcd\"" May 13 06:55:04.718670 env[1155]: time="2025-05-13T06:55:04.718649121Z" level=info msg="StartContainer for \"2eda69deadb77780673ad0cfdd21265d7f92ab3617fc947a8bd983149d522bcd\"" May 13 06:55:04.736673 systemd[1]: Started cri-containerd-2eda69deadb77780673ad0cfdd21265d7f92ab3617fc947a8bd983149d522bcd.scope. May 13 06:55:04.752000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.752000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fa23dba8688 items=0 ppid=3181 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265646136396465616462373737383036373361643063666464323132 May 13 06:55:04.752000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.752000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.752000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.752000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.752000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.752000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.752000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.752000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.752000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.752000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.752000 audit: BPF prog-id=182 op=LOAD May 13 06:55:04.752000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000218b08 items=0 ppid=3181 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265646136396465616462373737383036373361643063666464323132 May 13 06:55:04.753000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.753000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.753000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.753000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.753000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.753000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.753000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.753000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.753000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.753000 audit: BPF prog-id=183 op=LOAD May 13 06:55:04.753000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000218b58 items=0 ppid=3181 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265646136396465616462373737383036373361643063666464323132 May 13 06:55:04.753000 audit: BPF prog-id=183 op=UNLOAD May 13 06:55:04.753000 audit: BPF prog-id=182 op=UNLOAD May 13 06:55:04.753000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.753000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.753000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.753000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.753000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.753000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.753000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.753000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.753000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.753000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:04.753000 audit: BPF prog-id=184 op=LOAD May 13 06:55:04.753000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000218be8 items=0 ppid=3181 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:04.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265646136396465616462373737383036373361643063666464323132 May 13 06:55:04.775177 env[1155]: time="2025-05-13T06:55:04.775144616Z" level=info msg="StartContainer for \"2eda69deadb77780673ad0cfdd21265d7f92ab3617fc947a8bd983149d522bcd\" returns successfully" May 13 06:55:05.208188 env[1155]: time="2025-05-13T06:55:05.208099473Z" level=info msg="StopPodSandbox for \"fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5\"" May 13 06:55:05.208969 env[1155]: time="2025-05-13T06:55:05.208857057Z" level=info msg="StopPodSandbox for \"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\"" May 13 06:55:05.209528 env[1155]: time="2025-05-13T06:55:05.209467123Z" level=info msg="StopPodSandbox for \"9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f\"" May 13 06:55:05.273121 systemd-networkd[971]: cali0191a535426: Gained IPv6LL May 13 06:55:05.428250 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2530055339.mount: Deactivated successfully. May 13 06:55:05.514358 env[1155]: 2025-05-13 06:55:05.393 [INFO][3909] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" May 13 06:55:05.514358 env[1155]: 2025-05-13 06:55:05.393 [INFO][3909] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" iface="eth0" netns="/var/run/netns/cni-d06a6007-e82f-8716-3e15-6c244ba4fb18" May 13 06:55:05.514358 env[1155]: 2025-05-13 06:55:05.393 [INFO][3909] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" iface="eth0" netns="/var/run/netns/cni-d06a6007-e82f-8716-3e15-6c244ba4fb18" May 13 06:55:05.514358 env[1155]: 2025-05-13 06:55:05.393 [INFO][3909] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" iface="eth0" netns="/var/run/netns/cni-d06a6007-e82f-8716-3e15-6c244ba4fb18" May 13 06:55:05.514358 env[1155]: 2025-05-13 06:55:05.393 [INFO][3909] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" May 13 06:55:05.514358 env[1155]: 2025-05-13 06:55:05.393 [INFO][3909] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" May 13 06:55:05.514358 env[1155]: 2025-05-13 06:55:05.449 [INFO][3928] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" HandleID="k8s-pod-network.9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:55:05.514358 env[1155]: 2025-05-13 06:55:05.450 [INFO][3928] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:05.514358 env[1155]: 2025-05-13 06:55:05.450 [INFO][3928] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:05.514358 env[1155]: 2025-05-13 06:55:05.489 [WARNING][3928] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" HandleID="k8s-pod-network.9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:55:05.514358 env[1155]: 2025-05-13 06:55:05.489 [INFO][3928] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" HandleID="k8s-pod-network.9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:55:05.514358 env[1155]: 2025-05-13 06:55:05.506 [INFO][3928] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:05.514358 env[1155]: 2025-05-13 06:55:05.510 [INFO][3909] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" May 13 06:55:05.518460 systemd[1]: run-netns-cni\x2dd06a6007\x2de82f\x2d8716\x2d3e15\x2d6c244ba4fb18.mount: Deactivated successfully. May 13 06:55:05.519998 env[1155]: time="2025-05-13T06:55:05.519966510Z" level=info msg="TearDown network for sandbox \"9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f\" successfully" May 13 06:55:05.520111 env[1155]: time="2025-05-13T06:55:05.520088986Z" level=info msg="StopPodSandbox for \"9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f\" returns successfully" May 13 06:55:05.520941 env[1155]: time="2025-05-13T06:55:05.520833739Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-579977495-4vp7r,Uid:7dd504f7-f59c-4f56-83ca-cfbb5256e7fc,Namespace:calico-apiserver,Attempt:1,}" May 13 06:55:05.537951 env[1155]: 2025-05-13 06:55:05.361 [INFO][3901] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" May 13 06:55:05.537951 env[1155]: 2025-05-13 06:55:05.361 [INFO][3901] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" iface="eth0" netns="/var/run/netns/cni-0109eb37-279c-4aba-b286-e0340a95077f" May 13 06:55:05.537951 env[1155]: 2025-05-13 06:55:05.361 [INFO][3901] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" iface="eth0" netns="/var/run/netns/cni-0109eb37-279c-4aba-b286-e0340a95077f" May 13 06:55:05.537951 env[1155]: 2025-05-13 06:55:05.362 [INFO][3901] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" iface="eth0" netns="/var/run/netns/cni-0109eb37-279c-4aba-b286-e0340a95077f" May 13 06:55:05.537951 env[1155]: 2025-05-13 06:55:05.362 [INFO][3901] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" May 13 06:55:05.537951 env[1155]: 2025-05-13 06:55:05.362 [INFO][3901] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" May 13 06:55:05.537951 env[1155]: 2025-05-13 06:55:05.471 [INFO][3918] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" HandleID="k8s-pod-network.fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:55:05.537951 env[1155]: 2025-05-13 06:55:05.471 [INFO][3918] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:05.537951 env[1155]: 2025-05-13 06:55:05.506 [INFO][3918] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:05.537951 env[1155]: 2025-05-13 06:55:05.526 [WARNING][3918] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" HandleID="k8s-pod-network.fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:55:05.537951 env[1155]: 2025-05-13 06:55:05.526 [INFO][3918] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" HandleID="k8s-pod-network.fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:55:05.537951 env[1155]: 2025-05-13 06:55:05.535 [INFO][3918] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:05.537951 env[1155]: 2025-05-13 06:55:05.536 [INFO][3901] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" May 13 06:55:05.541027 systemd[1]: run-netns-cni\x2d0109eb37\x2d279c\x2d4aba\x2db286\x2de0340a95077f.mount: Deactivated successfully. May 13 06:55:05.542789 env[1155]: time="2025-05-13T06:55:05.542754812Z" level=info msg="TearDown network for sandbox \"fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5\" successfully" May 13 06:55:05.542892 env[1155]: time="2025-05-13T06:55:05.542872710Z" level=info msg="StopPodSandbox for \"fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5\" returns successfully" May 13 06:55:05.543514 kubelet[1935]: I0513 06:55:05.543461 1935 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-777cz" podStartSLOduration=41.543445623 podStartE2EDuration="41.543445623s" podCreationTimestamp="2025-05-13 06:54:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 06:55:05.535876585 +0000 UTC m=+47.463253978" watchObservedRunningTime="2025-05-13 06:55:05.543445623 +0000 UTC m=+47.470823026" May 13 06:55:05.543880 env[1155]: time="2025-05-13T06:55:05.543857505Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55c78455dd-hxgrr,Uid:9f406868-14be-4f07-a347-37e45f4acb44,Namespace:calico-system,Attempt:1,}" May 13 06:55:05.593139 systemd-networkd[971]: cali04e15ee1982: Gained IPv6LL May 13 06:55:05.605528 env[1155]: 2025-05-13 06:55:05.371 [INFO][3896] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" May 13 06:55:05.605528 env[1155]: 2025-05-13 06:55:05.371 [INFO][3896] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" iface="eth0" netns="/var/run/netns/cni-19490c8c-e02b-d9b2-567b-63a88c5755b8" May 13 06:55:05.605528 env[1155]: 2025-05-13 06:55:05.371 [INFO][3896] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" iface="eth0" netns="/var/run/netns/cni-19490c8c-e02b-d9b2-567b-63a88c5755b8" May 13 06:55:05.605528 env[1155]: 2025-05-13 06:55:05.373 [INFO][3896] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" iface="eth0" netns="/var/run/netns/cni-19490c8c-e02b-d9b2-567b-63a88c5755b8" May 13 06:55:05.605528 env[1155]: 2025-05-13 06:55:05.374 [INFO][3896] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" May 13 06:55:05.605528 env[1155]: 2025-05-13 06:55:05.374 [INFO][3896] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" May 13 06:55:05.605528 env[1155]: 2025-05-13 06:55:05.512 [INFO][3923] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" HandleID="k8s-pod-network.6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:55:05.605528 env[1155]: 2025-05-13 06:55:05.512 [INFO][3923] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:05.605528 env[1155]: 2025-05-13 06:55:05.536 [INFO][3923] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:05.605528 env[1155]: 2025-05-13 06:55:05.582 [WARNING][3923] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" HandleID="k8s-pod-network.6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:55:05.605528 env[1155]: 2025-05-13 06:55:05.582 [INFO][3923] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" HandleID="k8s-pod-network.6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:55:05.605528 env[1155]: 2025-05-13 06:55:05.596 [INFO][3923] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:05.605528 env[1155]: 2025-05-13 06:55:05.601 [INFO][3896] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" May 13 06:55:05.606207 env[1155]: time="2025-05-13T06:55:05.606178114Z" level=info msg="TearDown network for sandbox \"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\" successfully" May 13 06:55:05.606285 env[1155]: time="2025-05-13T06:55:05.606266984Z" level=info msg="StopPodSandbox for \"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\" returns successfully" May 13 06:55:05.610439 env[1155]: time="2025-05-13T06:55:05.610407717Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-579977495-p7jjc,Uid:e4a0e09c-41bf-47f7-91e8-38610cbd0d23,Namespace:calico-apiserver,Attempt:1,}" May 13 06:55:05.636000 audit[3961]: NETFILTER_CFG table=filter:108 family=2 entries=10 op=nft_register_rule pid=3961 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:05.639395 kernel: kauditd_printk_skb: 960 callbacks suppressed May 13 06:55:05.639461 kernel: audit: type=1325 audit(1747119305.636:1169): table=filter:108 family=2 entries=10 op=nft_register_rule pid=3961 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:05.636000 audit[3961]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc0bba4f50 a2=0 a3=7ffc0bba4f3c items=0 ppid=2110 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:05.649665 kernel: audit: type=1300 audit(1747119305.636:1169): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc0bba4f50 a2=0 a3=7ffc0bba4f3c items=0 ppid=2110 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:05.636000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:05.654988 kernel: audit: type=1327 audit(1747119305.636:1169): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:05.653000 audit[3961]: NETFILTER_CFG table=nat:109 family=2 entries=44 op=nft_register_rule pid=3961 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:05.659090 kernel: audit: type=1325 audit(1747119305.653:1170): table=nat:109 family=2 entries=44 op=nft_register_rule pid=3961 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:05.659115 systemd-networkd[971]: cali558875d5c2d: Gained IPv6LL May 13 06:55:05.653000 audit[3961]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc0bba4f50 a2=0 a3=7ffc0bba4f3c items=0 ppid=2110 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:05.653000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:05.673190 kernel: audit: type=1300 audit(1747119305.653:1170): arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc0bba4f50 a2=0 a3=7ffc0bba4f3c items=0 ppid=2110 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:05.673301 kernel: audit: type=1327 audit(1747119305.653:1170): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:05.812031 systemd-networkd[971]: calif9d730fd425: Link UP May 13 06:55:05.820602 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 06:55:05.820665 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif9d730fd425: link becomes ready May 13 06:55:05.820717 systemd-networkd[971]: calif9d730fd425: Gained carrier May 13 06:55:05.836638 env[1155]: 2025-05-13 06:55:05.673 [INFO][3938] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0 calico-apiserver-579977495- calico-apiserver 7dd504f7-f59c-4f56-83ca-cfbb5256e7fc 846 0 2025-05-13 06:54:31 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:579977495 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-7-n-7f05b50207.novalocal calico-apiserver-579977495-4vp7r eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calif9d730fd425 [] []}} ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" Namespace="calico-apiserver" Pod="calico-apiserver-579977495-4vp7r" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-" May 13 06:55:05.836638 env[1155]: 2025-05-13 06:55:05.673 [INFO][3938] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" Namespace="calico-apiserver" Pod="calico-apiserver-579977495-4vp7r" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:55:05.836638 env[1155]: 2025-05-13 06:55:05.741 [INFO][3981] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" HandleID="k8s-pod-network.d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:55:05.836638 env[1155]: 2025-05-13 06:55:05.762 [INFO][3981] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" HandleID="k8s-pod-network.d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000332c50), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-7-n-7f05b50207.novalocal", "pod":"calico-apiserver-579977495-4vp7r", "timestamp":"2025-05-13 06:55:05.741777099 +0000 UTC"}, Hostname:"ci-3510-3-7-n-7f05b50207.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 06:55:05.836638 env[1155]: 2025-05-13 06:55:05.762 [INFO][3981] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:05.836638 env[1155]: 2025-05-13 06:55:05.762 [INFO][3981] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:05.836638 env[1155]: 2025-05-13 06:55:05.762 [INFO][3981] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-7f05b50207.novalocal' May 13 06:55:05.836638 env[1155]: 2025-05-13 06:55:05.767 [INFO][3981] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:05.836638 env[1155]: 2025-05-13 06:55:05.772 [INFO][3981] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:05.836638 env[1155]: 2025-05-13 06:55:05.777 [INFO][3981] ipam/ipam.go 489: Trying affinity for 192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:05.836638 env[1155]: 2025-05-13 06:55:05.779 [INFO][3981] ipam/ipam.go 155: Attempting to load block cidr=192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:05.836638 env[1155]: 2025-05-13 06:55:05.782 [INFO][3981] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:05.836638 env[1155]: 2025-05-13 06:55:05.782 [INFO][3981] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.0/26 handle="k8s-pod-network.d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:05.836638 env[1155]: 2025-05-13 06:55:05.783 [INFO][3981] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362 May 13 06:55:05.836638 env[1155]: 2025-05-13 06:55:05.789 [INFO][3981] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.20.0/26 handle="k8s-pod-network.d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:05.836638 env[1155]: 2025-05-13 06:55:05.798 [INFO][3981] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.20.5/26] block=192.168.20.0/26 handle="k8s-pod-network.d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:05.836638 env[1155]: 2025-05-13 06:55:05.798 [INFO][3981] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.5/26] handle="k8s-pod-network.d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:05.836638 env[1155]: 2025-05-13 06:55:05.798 [INFO][3981] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:05.836638 env[1155]: 2025-05-13 06:55:05.798 [INFO][3981] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.20.5/26] IPv6=[] ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" HandleID="k8s-pod-network.d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:55:05.837409 env[1155]: 2025-05-13 06:55:05.800 [INFO][3938] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" Namespace="calico-apiserver" Pod="calico-apiserver-579977495-4vp7r" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0", GenerateName:"calico-apiserver-579977495-", Namespace:"calico-apiserver", SelfLink:"", UID:"7dd504f7-f59c-4f56-83ca-cfbb5256e7fc", ResourceVersion:"846", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"579977495", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"", Pod:"calico-apiserver-579977495-4vp7r", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.20.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif9d730fd425", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:05.837409 env[1155]: 2025-05-13 06:55:05.800 [INFO][3938] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.20.5/32] ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" Namespace="calico-apiserver" Pod="calico-apiserver-579977495-4vp7r" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:55:05.837409 env[1155]: 2025-05-13 06:55:05.800 [INFO][3938] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif9d730fd425 ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" Namespace="calico-apiserver" Pod="calico-apiserver-579977495-4vp7r" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:55:05.837409 env[1155]: 2025-05-13 06:55:05.821 [INFO][3938] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" Namespace="calico-apiserver" Pod="calico-apiserver-579977495-4vp7r" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:55:05.837409 env[1155]: 2025-05-13 06:55:05.822 [INFO][3938] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" Namespace="calico-apiserver" Pod="calico-apiserver-579977495-4vp7r" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0", GenerateName:"calico-apiserver-579977495-", Namespace:"calico-apiserver", SelfLink:"", UID:"7dd504f7-f59c-4f56-83ca-cfbb5256e7fc", ResourceVersion:"846", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"579977495", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362", Pod:"calico-apiserver-579977495-4vp7r", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.20.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif9d730fd425", MAC:"9e:56:a4:64:7f:5d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:05.837409 env[1155]: 2025-05-13 06:55:05.835 [INFO][3938] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" Namespace="calico-apiserver" Pod="calico-apiserver-579977495-4vp7r" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:55:05.858288 env[1155]: time="2025-05-13T06:55:05.858224678Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 06:55:05.858435 env[1155]: time="2025-05-13T06:55:05.858267039Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 06:55:05.858435 env[1155]: time="2025-05-13T06:55:05.858280591Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 06:55:05.858576 env[1155]: time="2025-05-13T06:55:05.858544876Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362 pid=4019 runtime=io.containerd.runc.v2 May 13 06:55:05.864000 audit[4018]: NETFILTER_CFG table=filter:110 family=2 entries=42 op=nft_register_chain pid=4018 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 06:55:05.864000 audit[4018]: SYSCALL arch=c000003e syscall=46 success=yes exit=22688 a0=3 a1=7fff4d1a9f40 a2=0 a3=7fff4d1a9f2c items=0 ppid=3241 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:05.877610 kernel: audit: type=1325 audit(1747119305.864:1171): table=filter:110 family=2 entries=42 op=nft_register_chain pid=4018 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 06:55:05.878700 kernel: audit: type=1300 audit(1747119305.864:1171): arch=c000003e syscall=46 success=yes exit=22688 a0=3 a1=7fff4d1a9f40 a2=0 a3=7fff4d1a9f2c items=0 ppid=3241 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:05.878729 kernel: audit: type=1327 audit(1747119305.864:1171): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 06:55:05.864000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 06:55:05.885642 systemd[1]: Started cri-containerd-d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362.scope. May 13 06:55:05.918396 kernel: audit: type=1400 audit(1747119305.911:1172): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.915000 audit: BPF prog-id=185 op=LOAD May 13 06:55:05.916000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4019 pid=4028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:05.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433346135646364333539393962363663383536633539366535316162 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4019 pid=4028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:05.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433346135646364333539393962363663383536633539366535316162 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit: BPF prog-id=186 op=LOAD May 13 06:55:05.916000 audit[4028]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000359ff0 items=0 ppid=4019 pid=4028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:05.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433346135646364333539393962363663383536633539366535316162 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit: BPF prog-id=187 op=LOAD May 13 06:55:05.916000 audit[4028]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003d8038 items=0 ppid=4019 pid=4028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:05.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433346135646364333539393962363663383536633539366535316162 May 13 06:55:05.916000 audit: BPF prog-id=187 op=UNLOAD May 13 06:55:05.916000 audit: BPF prog-id=186 op=UNLOAD May 13 06:55:05.916000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { perfmon } for pid=4028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit[4028]: AVC avc: denied { bpf } for pid=4028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:05.916000 audit: BPF prog-id=188 op=LOAD May 13 06:55:05.916000 audit[4028]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003d8448 items=0 ppid=4019 pid=4028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:05.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433346135646364333539393962363663383536633539366535316162 May 13 06:55:05.949698 systemd-networkd[971]: cali3ab6b54ab96: Link UP May 13 06:55:05.952499 systemd-networkd[971]: cali3ab6b54ab96: Gained carrier May 13 06:55:05.952943 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3ab6b54ab96: link becomes ready May 13 06:55:05.972707 env[1155]: 2025-05-13 06:55:05.677 [INFO][3951] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0 calico-kube-controllers-55c78455dd- calico-system 9f406868-14be-4f07-a347-37e45f4acb44 844 0 2025-05-13 06:54:32 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:55c78455dd projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-7-n-7f05b50207.novalocal calico-kube-controllers-55c78455dd-hxgrr eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali3ab6b54ab96 [] []}} ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" Namespace="calico-system" Pod="calico-kube-controllers-55c78455dd-hxgrr" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-" May 13 06:55:05.972707 env[1155]: 2025-05-13 06:55:05.678 [INFO][3951] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" Namespace="calico-system" Pod="calico-kube-controllers-55c78455dd-hxgrr" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:55:05.972707 env[1155]: 2025-05-13 06:55:05.756 [INFO][3977] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" HandleID="k8s-pod-network.9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:55:05.972707 env[1155]: 2025-05-13 06:55:05.770 [INFO][3977] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" HandleID="k8s-pod-network.9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031a760), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-7-n-7f05b50207.novalocal", "pod":"calico-kube-controllers-55c78455dd-hxgrr", "timestamp":"2025-05-13 06:55:05.756307212 +0000 UTC"}, Hostname:"ci-3510-3-7-n-7f05b50207.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 06:55:05.972707 env[1155]: 2025-05-13 06:55:05.770 [INFO][3977] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:05.972707 env[1155]: 2025-05-13 06:55:05.798 [INFO][3977] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:05.972707 env[1155]: 2025-05-13 06:55:05.798 [INFO][3977] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-7f05b50207.novalocal' May 13 06:55:05.972707 env[1155]: 2025-05-13 06:55:05.875 [INFO][3977] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:05.972707 env[1155]: 2025-05-13 06:55:05.891 [INFO][3977] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:05.972707 env[1155]: 2025-05-13 06:55:05.904 [INFO][3977] ipam/ipam.go 489: Trying affinity for 192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:05.972707 env[1155]: 2025-05-13 06:55:05.906 [INFO][3977] ipam/ipam.go 155: Attempting to load block cidr=192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:05.972707 env[1155]: 2025-05-13 06:55:05.909 [INFO][3977] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:05.972707 env[1155]: 2025-05-13 06:55:05.909 [INFO][3977] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.0/26 handle="k8s-pod-network.9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:05.972707 env[1155]: 2025-05-13 06:55:05.921 [INFO][3977] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279 May 13 06:55:05.972707 env[1155]: 2025-05-13 06:55:05.926 [INFO][3977] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.20.0/26 handle="k8s-pod-network.9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:05.972707 env[1155]: 2025-05-13 06:55:05.935 [INFO][3977] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.20.6/26] block=192.168.20.0/26 handle="k8s-pod-network.9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:05.972707 env[1155]: 2025-05-13 06:55:05.935 [INFO][3977] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.6/26] handle="k8s-pod-network.9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:05.972707 env[1155]: 2025-05-13 06:55:05.935 [INFO][3977] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:05.972707 env[1155]: 2025-05-13 06:55:05.935 [INFO][3977] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.20.6/26] IPv6=[] ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" HandleID="k8s-pod-network.9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:55:05.973565 env[1155]: 2025-05-13 06:55:05.936 [INFO][3951] cni-plugin/k8s.go 386: Populated endpoint ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" Namespace="calico-system" Pod="calico-kube-controllers-55c78455dd-hxgrr" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0", GenerateName:"calico-kube-controllers-55c78455dd-", Namespace:"calico-system", SelfLink:"", UID:"9f406868-14be-4f07-a347-37e45f4acb44", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55c78455dd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"", Pod:"calico-kube-controllers-55c78455dd-hxgrr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.20.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3ab6b54ab96", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:05.973565 env[1155]: 2025-05-13 06:55:05.937 [INFO][3951] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.20.6/32] ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" Namespace="calico-system" Pod="calico-kube-controllers-55c78455dd-hxgrr" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:55:05.973565 env[1155]: 2025-05-13 06:55:05.937 [INFO][3951] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3ab6b54ab96 ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" Namespace="calico-system" Pod="calico-kube-controllers-55c78455dd-hxgrr" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:55:05.973565 env[1155]: 2025-05-13 06:55:05.953 [INFO][3951] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" Namespace="calico-system" Pod="calico-kube-controllers-55c78455dd-hxgrr" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:55:05.973565 env[1155]: 2025-05-13 06:55:05.954 [INFO][3951] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" Namespace="calico-system" Pod="calico-kube-controllers-55c78455dd-hxgrr" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0", GenerateName:"calico-kube-controllers-55c78455dd-", Namespace:"calico-system", SelfLink:"", UID:"9f406868-14be-4f07-a347-37e45f4acb44", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55c78455dd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279", Pod:"calico-kube-controllers-55c78455dd-hxgrr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.20.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3ab6b54ab96", MAC:"56:35:72:77:8b:2f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:05.973565 env[1155]: 2025-05-13 06:55:05.970 [INFO][3951] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" Namespace="calico-system" Pod="calico-kube-controllers-55c78455dd-hxgrr" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:55:05.979136 env[1155]: time="2025-05-13T06:55:05.979102766Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-579977495-4vp7r,Uid:7dd504f7-f59c-4f56-83ca-cfbb5256e7fc,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362\"" May 13 06:55:05.999585 env[1155]: time="2025-05-13T06:55:05.999468514Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 06:55:05.999759 env[1155]: time="2025-05-13T06:55:05.999557955Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 06:55:05.999759 env[1155]: time="2025-05-13T06:55:05.999573280Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 06:55:05.999863 env[1155]: time="2025-05-13T06:55:05.999745830Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279 pid=4073 runtime=io.containerd.runc.v2 May 13 06:55:05.999000 audit[4065]: NETFILTER_CFG table=filter:111 family=2 entries=46 op=nft_register_chain pid=4065 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 06:55:05.999000 audit[4065]: SYSCALL arch=c000003e syscall=46 success=yes exit=22188 a0=3 a1=7fff4bf95680 a2=0 a3=7fff4bf9566c items=0 ppid=3241 pid=4065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:05.999000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 06:55:06.022399 systemd[1]: Started cri-containerd-9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279.scope. May 13 06:55:06.043895 systemd-networkd[971]: cali01b582543c9: Link UP May 13 06:55:06.046327 systemd-networkd[971]: cali01b582543c9: Gained carrier May 13 06:55:06.047989 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali01b582543c9: link becomes ready May 13 06:55:06.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.048000 audit: BPF prog-id=189 op=LOAD May 13 06:55:06.049000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.049000 audit[4083]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4073 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:06.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962653562613537383163633936666465663164343330396365356631 May 13 06:55:06.049000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.049000 audit[4083]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4073 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:06.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962653562613537383163633936666465663164343330396365356631 May 13 06:55:06.049000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.049000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.049000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.049000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.049000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.049000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.049000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.049000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.049000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.049000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.049000 audit: BPF prog-id=190 op=LOAD May 13 06:55:06.049000 audit[4083]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002edd90 items=0 ppid=4073 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:06.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962653562613537383163633936666465663164343330396365356631 May 13 06:55:06.049000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.049000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.049000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.049000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.049000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.049000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.049000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.049000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.049000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.049000 audit: BPF prog-id=191 op=LOAD May 13 06:55:06.049000 audit[4083]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002eddd8 items=0 ppid=4073 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:06.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962653562613537383163633936666465663164343330396365356631 May 13 06:55:06.050000 audit: BPF prog-id=191 op=UNLOAD May 13 06:55:06.050000 audit: BPF prog-id=190 op=UNLOAD May 13 06:55:06.050000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.050000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.050000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.050000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.050000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.050000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.050000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.050000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.050000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.050000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.050000 audit: BPF prog-id=192 op=LOAD May 13 06:55:06.050000 audit[4083]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003e61e8 items=0 ppid=4073 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:06.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962653562613537383163633936666465663164343330396365356631 May 13 06:55:06.069106 env[1155]: 2025-05-13 06:55:05.737 [INFO][3964] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0 calico-apiserver-579977495- calico-apiserver e4a0e09c-41bf-47f7-91e8-38610cbd0d23 845 0 2025-05-13 06:54:31 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:579977495 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-7-n-7f05b50207.novalocal calico-apiserver-579977495-p7jjc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali01b582543c9 [] []}} ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" Namespace="calico-apiserver" Pod="calico-apiserver-579977495-p7jjc" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-" May 13 06:55:06.069106 env[1155]: 2025-05-13 06:55:05.737 [INFO][3964] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" Namespace="calico-apiserver" Pod="calico-apiserver-579977495-p7jjc" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:55:06.069106 env[1155]: 2025-05-13 06:55:05.828 [INFO][3990] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" HandleID="k8s-pod-network.f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:55:06.069106 env[1155]: 2025-05-13 06:55:05.862 [INFO][3990] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" HandleID="k8s-pod-network.f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050ff0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-7-n-7f05b50207.novalocal", "pod":"calico-apiserver-579977495-p7jjc", "timestamp":"2025-05-13 06:55:05.828406314 +0000 UTC"}, Hostname:"ci-3510-3-7-n-7f05b50207.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 06:55:06.069106 env[1155]: 2025-05-13 06:55:05.862 [INFO][3990] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:06.069106 env[1155]: 2025-05-13 06:55:05.935 [INFO][3990] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:06.069106 env[1155]: 2025-05-13 06:55:05.935 [INFO][3990] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-7f05b50207.novalocal' May 13 06:55:06.069106 env[1155]: 2025-05-13 06:55:05.972 [INFO][3990] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:06.069106 env[1155]: 2025-05-13 06:55:05.984 [INFO][3990] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:06.069106 env[1155]: 2025-05-13 06:55:06.003 [INFO][3990] ipam/ipam.go 489: Trying affinity for 192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:06.069106 env[1155]: 2025-05-13 06:55:06.006 [INFO][3990] ipam/ipam.go 155: Attempting to load block cidr=192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:06.069106 env[1155]: 2025-05-13 06:55:06.010 [INFO][3990] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:06.069106 env[1155]: 2025-05-13 06:55:06.010 [INFO][3990] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.0/26 handle="k8s-pod-network.f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:06.069106 env[1155]: 2025-05-13 06:55:06.012 [INFO][3990] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb May 13 06:55:06.069106 env[1155]: 2025-05-13 06:55:06.018 [INFO][3990] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.20.0/26 handle="k8s-pod-network.f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:06.069106 env[1155]: 2025-05-13 06:55:06.032 [INFO][3990] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.20.7/26] block=192.168.20.0/26 handle="k8s-pod-network.f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:06.069106 env[1155]: 2025-05-13 06:55:06.032 [INFO][3990] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.7/26] handle="k8s-pod-network.f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:06.069106 env[1155]: 2025-05-13 06:55:06.032 [INFO][3990] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:06.069106 env[1155]: 2025-05-13 06:55:06.032 [INFO][3990] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.20.7/26] IPv6=[] ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" HandleID="k8s-pod-network.f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:55:06.069732 env[1155]: 2025-05-13 06:55:06.034 [INFO][3964] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" Namespace="calico-apiserver" Pod="calico-apiserver-579977495-p7jjc" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0", GenerateName:"calico-apiserver-579977495-", Namespace:"calico-apiserver", SelfLink:"", UID:"e4a0e09c-41bf-47f7-91e8-38610cbd0d23", ResourceVersion:"845", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"579977495", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"", Pod:"calico-apiserver-579977495-p7jjc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.20.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali01b582543c9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:06.069732 env[1155]: 2025-05-13 06:55:06.034 [INFO][3964] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.20.7/32] ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" Namespace="calico-apiserver" Pod="calico-apiserver-579977495-p7jjc" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:55:06.069732 env[1155]: 2025-05-13 06:55:06.034 [INFO][3964] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali01b582543c9 ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" Namespace="calico-apiserver" Pod="calico-apiserver-579977495-p7jjc" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:55:06.069732 env[1155]: 2025-05-13 06:55:06.044 [INFO][3964] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" Namespace="calico-apiserver" Pod="calico-apiserver-579977495-p7jjc" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:55:06.069732 env[1155]: 2025-05-13 06:55:06.047 [INFO][3964] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" Namespace="calico-apiserver" Pod="calico-apiserver-579977495-p7jjc" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0", GenerateName:"calico-apiserver-579977495-", Namespace:"calico-apiserver", SelfLink:"", UID:"e4a0e09c-41bf-47f7-91e8-38610cbd0d23", ResourceVersion:"845", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"579977495", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb", Pod:"calico-apiserver-579977495-p7jjc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.20.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali01b582543c9", MAC:"fe:af:86:0d:cf:47", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:06.069732 env[1155]: 2025-05-13 06:55:06.067 [INFO][3964] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" Namespace="calico-apiserver" Pod="calico-apiserver-579977495-p7jjc" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:55:06.110178 env[1155]: time="2025-05-13T06:55:06.102035509Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 06:55:06.110178 env[1155]: time="2025-05-13T06:55:06.102077671Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 06:55:06.110178 env[1155]: time="2025-05-13T06:55:06.102091123Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 06:55:06.110178 env[1155]: time="2025-05-13T06:55:06.102219640Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb pid=4121 runtime=io.containerd.runc.v2 May 13 06:55:06.120000 audit[4128]: NETFILTER_CFG table=filter:112 family=2 entries=38 op=nft_register_chain pid=4128 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 06:55:06.120000 audit[4128]: SYSCALL arch=c000003e syscall=46 success=yes exit=21536 a0=3 a1=7ffcebe493f0 a2=0 a3=7ffcebe493dc items=0 ppid=3241 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:06.120000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 06:55:06.134419 systemd[1]: Started cri-containerd-f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb.scope. May 13 06:55:06.145754 env[1155]: time="2025-05-13T06:55:06.145712733Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55c78455dd-hxgrr,Uid:9f406868-14be-4f07-a347-37e45f4acb44,Namespace:calico-system,Attempt:1,} returns sandbox id \"9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279\"" May 13 06:55:06.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.159000 audit: BPF prog-id=193 op=LOAD May 13 06:55:06.160000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.160000 audit[4132]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4121 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:06.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333130326661366233653636363937383737336137343965346238 May 13 06:55:06.160000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.160000 audit[4132]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4121 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:06.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333130326661366233653636363937383737336137343965346238 May 13 06:55:06.160000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.160000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.160000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.160000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.160000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.160000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.160000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.160000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.160000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.160000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.160000 audit: BPF prog-id=194 op=LOAD May 13 06:55:06.160000 audit[4132]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000257ce0 items=0 ppid=4121 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:06.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333130326661366233653636363937383737336137343965346238 May 13 06:55:06.160000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.160000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.160000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.160000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.160000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.160000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.160000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.160000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.160000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.160000 audit: BPF prog-id=195 op=LOAD May 13 06:55:06.160000 audit[4132]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000257d28 items=0 ppid=4121 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:06.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333130326661366233653636363937383737336137343965346238 May 13 06:55:06.161000 audit: BPF prog-id=195 op=UNLOAD May 13 06:55:06.161000 audit: BPF prog-id=194 op=UNLOAD May 13 06:55:06.161000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.161000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.161000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.161000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.161000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.161000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.161000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.161000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.161000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.161000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:06.161000 audit: BPF prog-id=196 op=LOAD May 13 06:55:06.161000 audit[4132]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00035a138 items=0 ppid=4121 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:06.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333130326661366233653636363937383737336137343965346238 May 13 06:55:06.203971 env[1155]: time="2025-05-13T06:55:06.203932993Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-579977495-p7jjc,Uid:e4a0e09c-41bf-47f7-91e8-38610cbd0d23,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb\"" May 13 06:55:06.433561 systemd[1]: run-netns-cni\x2d19490c8c\x2de02b\x2dd9b2\x2d567b\x2d63a88c5755b8.mount: Deactivated successfully. May 13 06:55:06.678000 audit[4161]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4161 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:06.678000 audit[4161]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff41f07e70 a2=0 a3=7fff41f07e5c items=0 ppid=2110 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:06.678000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:06.691000 audit[4161]: NETFILTER_CFG table=nat:114 family=2 entries=56 op=nft_register_chain pid=4161 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:06.691000 audit[4161]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff41f07e70 a2=0 a3=7fff41f07e5c items=0 ppid=2110 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:06.691000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:07.384132 systemd-networkd[971]: calif9d730fd425: Gained IPv6LL May 13 06:55:07.576139 systemd-networkd[971]: cali01b582543c9: Gained IPv6LL May 13 06:55:07.642160 systemd-networkd[971]: cali3ab6b54ab96: Gained IPv6LL May 13 06:55:09.844201 env[1155]: time="2025-05-13T06:55:09.844122897Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:09.846803 env[1155]: time="2025-05-13T06:55:09.846744682Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:09.849030 env[1155]: time="2025-05-13T06:55:09.848982343Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:09.851418 env[1155]: time="2025-05-13T06:55:09.851366283Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:09.851993 env[1155]: time="2025-05-13T06:55:09.851932317Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 13 06:55:09.857005 env[1155]: time="2025-05-13T06:55:09.856582997Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 13 06:55:09.857329 env[1155]: time="2025-05-13T06:55:09.857290372Z" level=info msg="CreateContainer within sandbox \"871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 06:55:09.876646 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1496776652.mount: Deactivated successfully. May 13 06:55:09.885705 env[1155]: time="2025-05-13T06:55:09.885646614Z" level=info msg="CreateContainer within sandbox \"871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"69431ebf0d623a2db2ac7f2df8c183d185ed73f09c941fff4134a2fc2e72f65b\"" May 13 06:55:09.889484 env[1155]: time="2025-05-13T06:55:09.886325169Z" level=info msg="StartContainer for \"69431ebf0d623a2db2ac7f2df8c183d185ed73f09c941fff4134a2fc2e72f65b\"" May 13 06:55:09.906706 systemd[1]: Started cri-containerd-69431ebf0d623a2db2ac7f2df8c183d185ed73f09c941fff4134a2fc2e72f65b.scope. May 13 06:55:09.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.930000 audit: BPF prog-id=197 op=LOAD May 13 06:55:09.931000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3642 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:09.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639343331656266306436323361326462326163376632646638633138 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3642 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:09.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639343331656266306436323361326462326163376632646638633138 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit: BPF prog-id=198 op=LOAD May 13 06:55:09.931000 audit[4177]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002cfee0 items=0 ppid=3642 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:09.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639343331656266306436323361326462326163376632646638633138 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit: BPF prog-id=199 op=LOAD May 13 06:55:09.931000 audit[4177]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002cff28 items=0 ppid=3642 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:09.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639343331656266306436323361326462326163376632646638633138 May 13 06:55:09.931000 audit: BPF prog-id=199 op=UNLOAD May 13 06:55:09.931000 audit: BPF prog-id=198 op=UNLOAD May 13 06:55:09.931000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:09.931000 audit: BPF prog-id=200 op=LOAD May 13 06:55:09.931000 audit[4177]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a8338 items=0 ppid=3642 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:09.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639343331656266306436323361326462326163376632646638633138 May 13 06:55:09.960661 env[1155]: time="2025-05-13T06:55:09.960608667Z" level=info msg="StartContainer for \"69431ebf0d623a2db2ac7f2df8c183d185ed73f09c941fff4134a2fc2e72f65b\" returns successfully" May 13 06:55:10.587000 audit[4207]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4207 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:10.587000 audit[4207]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd20b074c0 a2=0 a3=7ffd20b074ac items=0 ppid=2110 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:10.587000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:10.593000 audit[4207]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4207 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:10.593000 audit[4207]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd20b074c0 a2=0 a3=7ffd20b074ac items=0 ppid=2110 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:10.593000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:10.988737 kernel: kauditd_printk_skb: 245 callbacks suppressed May 13 06:55:10.988878 kernel: audit: type=1400 audit(1747119310.980:1250): avc: denied { watch } for pid=4187 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_54_48.3599752594/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c633,c794 tclass=file permissive=0 May 13 06:55:10.980000 audit[4187]: AVC avc: denied { watch } for pid=4187 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_54_48.3599752594/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c633,c794 tclass=file permissive=0 May 13 06:55:10.980000 audit[4187]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000fe2720 a2=fc6 a3=0 items=0 ppid=3642 pid=4187 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 key=(null) May 13 06:55:10.998995 kernel: audit: type=1300 audit(1747119310.980:1250): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000fe2720 a2=fc6 a3=0 items=0 ppid=3642 pid=4187 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 key=(null) May 13 06:55:10.980000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 06:55:11.005981 kernel: audit: type=1327 audit(1747119310.980:1250): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 06:55:11.021477 kubelet[1935]: I0513 06:55:11.021380 1935 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-fbfdb4f49-tw2jz" podStartSLOduration=33.393064083 podStartE2EDuration="39.02134732s" podCreationTimestamp="2025-05-13 06:54:32 +0000 UTC" firstStartedPulling="2025-05-13 06:55:04.225350227 +0000 UTC m=+46.152727620" lastFinishedPulling="2025-05-13 06:55:09.853633414 +0000 UTC m=+51.781010857" observedRunningTime="2025-05-13 06:55:10.556955789 +0000 UTC m=+52.484333212" watchObservedRunningTime="2025-05-13 06:55:11.02134732 +0000 UTC m=+52.948724763" May 13 06:55:11.057000 audit[4209]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4209 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:11.057000 audit[4209]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdb4e1e100 a2=0 a3=7ffdb4e1e0ec items=0 ppid=2110 pid=4209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:11.070405 kernel: audit: type=1325 audit(1747119311.057:1251): table=filter:117 family=2 entries=9 op=nft_register_rule pid=4209 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:11.070535 kernel: audit: type=1300 audit(1747119311.057:1251): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdb4e1e100 a2=0 a3=7ffdb4e1e0ec items=0 ppid=2110 pid=4209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:11.057000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:11.078961 kernel: audit: type=1327 audit(1747119311.057:1251): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:11.074000 audit[4209]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=4209 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:11.083945 kernel: audit: type=1325 audit(1747119311.074:1252): table=nat:118 family=2 entries=27 op=nft_register_chain pid=4209 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:11.074000 audit[4209]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffdb4e1e100 a2=0 a3=7ffdb4e1e0ec items=0 ppid=2110 pid=4209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:11.092952 kernel: audit: type=1300 audit(1747119311.074:1252): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffdb4e1e100 a2=0 a3=7ffdb4e1e0ec items=0 ppid=2110 pid=4209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:11.093063 kernel: audit: type=1327 audit(1747119311.074:1252): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:11.074000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:11.119108 systemd[1]: Created slice kubepods-besteffort-pode5c91341_a1bc_40c2_b30f_aea6483afd42.slice. May 13 06:55:11.247248 kubelet[1935]: I0513 06:55:11.247160 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e5c91341-a1bc-40c2-b30f-aea6483afd42-calico-apiserver-certs\") pod \"calico-apiserver-fbfdb4f49-mmbnh\" (UID: \"e5c91341-a1bc-40c2-b30f-aea6483afd42\") " pod="calico-apiserver/calico-apiserver-fbfdb4f49-mmbnh" May 13 06:55:11.247470 kubelet[1935]: I0513 06:55:11.247427 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t7szh\" (UniqueName: \"kubernetes.io/projected/e5c91341-a1bc-40c2-b30f-aea6483afd42-kube-api-access-t7szh\") pod \"calico-apiserver-fbfdb4f49-mmbnh\" (UID: \"e5c91341-a1bc-40c2-b30f-aea6483afd42\") " pod="calico-apiserver/calico-apiserver-fbfdb4f49-mmbnh" May 13 06:55:11.424967 env[1155]: time="2025-05-13T06:55:11.424849128Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-fbfdb4f49-mmbnh,Uid:e5c91341-a1bc-40c2-b30f-aea6483afd42,Namespace:calico-apiserver,Attempt:0,}" May 13 06:55:11.673160 systemd-networkd[971]: cali03d777b0d15: Link UP May 13 06:55:11.677768 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 06:55:11.677841 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali03d777b0d15: link becomes ready May 13 06:55:11.680010 systemd-networkd[971]: cali03d777b0d15: Gained carrier May 13 06:55:11.696646 env[1155]: 2025-05-13 06:55:11.547 [INFO][4214] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--mmbnh-eth0 calico-apiserver-fbfdb4f49- calico-apiserver e5c91341-a1bc-40c2-b30f-aea6483afd42 908 0 2025-05-13 06:55:11 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:fbfdb4f49 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-7-n-7f05b50207.novalocal calico-apiserver-fbfdb4f49-mmbnh eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali03d777b0d15 [] []}} ContainerID="c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd" Namespace="calico-apiserver" Pod="calico-apiserver-fbfdb4f49-mmbnh" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--mmbnh-" May 13 06:55:11.696646 env[1155]: 2025-05-13 06:55:11.547 [INFO][4214] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd" Namespace="calico-apiserver" Pod="calico-apiserver-fbfdb4f49-mmbnh" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--mmbnh-eth0" May 13 06:55:11.696646 env[1155]: 2025-05-13 06:55:11.597 [INFO][4226] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd" HandleID="k8s-pod-network.c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--mmbnh-eth0" May 13 06:55:11.696646 env[1155]: 2025-05-13 06:55:11.614 [INFO][4226] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd" HandleID="k8s-pod-network.c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--mmbnh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029f440), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-7-n-7f05b50207.novalocal", "pod":"calico-apiserver-fbfdb4f49-mmbnh", "timestamp":"2025-05-13 06:55:11.597580397 +0000 UTC"}, Hostname:"ci-3510-3-7-n-7f05b50207.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 06:55:11.696646 env[1155]: 2025-05-13 06:55:11.614 [INFO][4226] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:11.696646 env[1155]: 2025-05-13 06:55:11.614 [INFO][4226] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:11.696646 env[1155]: 2025-05-13 06:55:11.614 [INFO][4226] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-7f05b50207.novalocal' May 13 06:55:11.696646 env[1155]: 2025-05-13 06:55:11.617 [INFO][4226] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:11.696646 env[1155]: 2025-05-13 06:55:11.622 [INFO][4226] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:11.696646 env[1155]: 2025-05-13 06:55:11.628 [INFO][4226] ipam/ipam.go 489: Trying affinity for 192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:11.696646 env[1155]: 2025-05-13 06:55:11.630 [INFO][4226] ipam/ipam.go 155: Attempting to load block cidr=192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:11.696646 env[1155]: 2025-05-13 06:55:11.633 [INFO][4226] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:11.696646 env[1155]: 2025-05-13 06:55:11.633 [INFO][4226] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.0/26 handle="k8s-pod-network.c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:11.696646 env[1155]: 2025-05-13 06:55:11.635 [INFO][4226] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd May 13 06:55:11.696646 env[1155]: 2025-05-13 06:55:11.644 [INFO][4226] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.20.0/26 handle="k8s-pod-network.c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:11.696646 env[1155]: 2025-05-13 06:55:11.658 [INFO][4226] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.20.8/26] block=192.168.20.0/26 handle="k8s-pod-network.c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:11.696646 env[1155]: 2025-05-13 06:55:11.658 [INFO][4226] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.8/26] handle="k8s-pod-network.c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:11.696646 env[1155]: 2025-05-13 06:55:11.658 [INFO][4226] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:11.696646 env[1155]: 2025-05-13 06:55:11.658 [INFO][4226] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.20.8/26] IPv6=[] ContainerID="c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd" HandleID="k8s-pod-network.c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--mmbnh-eth0" May 13 06:55:11.697568 env[1155]: 2025-05-13 06:55:11.664 [INFO][4214] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd" Namespace="calico-apiserver" Pod="calico-apiserver-fbfdb4f49-mmbnh" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--mmbnh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--mmbnh-eth0", GenerateName:"calico-apiserver-fbfdb4f49-", Namespace:"calico-apiserver", SelfLink:"", UID:"e5c91341-a1bc-40c2-b30f-aea6483afd42", ResourceVersion:"908", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 55, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"fbfdb4f49", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"", Pod:"calico-apiserver-fbfdb4f49-mmbnh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.20.8/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali03d777b0d15", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:11.697568 env[1155]: 2025-05-13 06:55:11.665 [INFO][4214] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.20.8/32] ContainerID="c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd" Namespace="calico-apiserver" Pod="calico-apiserver-fbfdb4f49-mmbnh" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--mmbnh-eth0" May 13 06:55:11.697568 env[1155]: 2025-05-13 06:55:11.665 [INFO][4214] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali03d777b0d15 ContainerID="c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd" Namespace="calico-apiserver" Pod="calico-apiserver-fbfdb4f49-mmbnh" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--mmbnh-eth0" May 13 06:55:11.697568 env[1155]: 2025-05-13 06:55:11.680 [INFO][4214] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd" Namespace="calico-apiserver" Pod="calico-apiserver-fbfdb4f49-mmbnh" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--mmbnh-eth0" May 13 06:55:11.697568 env[1155]: 2025-05-13 06:55:11.681 [INFO][4214] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd" Namespace="calico-apiserver" Pod="calico-apiserver-fbfdb4f49-mmbnh" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--mmbnh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--mmbnh-eth0", GenerateName:"calico-apiserver-fbfdb4f49-", Namespace:"calico-apiserver", SelfLink:"", UID:"e5c91341-a1bc-40c2-b30f-aea6483afd42", ResourceVersion:"908", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 55, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"fbfdb4f49", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd", Pod:"calico-apiserver-fbfdb4f49-mmbnh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.20.8/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali03d777b0d15", MAC:"4e:15:9f:ac:a0:66", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:11.697568 env[1155]: 2025-05-13 06:55:11.694 [INFO][4214] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd" Namespace="calico-apiserver" Pod="calico-apiserver-fbfdb4f49-mmbnh" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--mmbnh-eth0" May 13 06:55:11.722000 audit[4247]: NETFILTER_CFG table=filter:119 family=2 entries=42 op=nft_register_chain pid=4247 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 06:55:11.722000 audit[4247]: SYSCALL arch=c000003e syscall=46 success=yes exit=22728 a0=3 a1=7ffca12f6970 a2=0 a3=7ffca12f695c items=0 ppid=3241 pid=4247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:11.722000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 06:55:11.732004 kernel: audit: type=1325 audit(1747119311.722:1253): table=filter:119 family=2 entries=42 op=nft_register_chain pid=4247 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 06:55:11.736664 env[1155]: time="2025-05-13T06:55:11.736582446Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 06:55:11.736836 env[1155]: time="2025-05-13T06:55:11.736629607Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 06:55:11.737042 env[1155]: time="2025-05-13T06:55:11.736819813Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 06:55:11.737516 env[1155]: time="2025-05-13T06:55:11.737301357Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd pid=4255 runtime=io.containerd.runc.v2 May 13 06:55:11.760360 systemd[1]: Started cri-containerd-c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd.scope. May 13 06:55:11.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.779000 audit: BPF prog-id=201 op=LOAD May 13 06:55:11.779000 audit[4265]: AVC avc: denied { bpf } for pid=4265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.779000 audit[4265]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4255 pid=4265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:11.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331326231656363386562303034376330653932646333636136633764 May 13 06:55:11.779000 audit[4265]: AVC avc: denied { perfmon } for pid=4265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.779000 audit[4265]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4255 pid=4265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:11.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331326231656363386562303034376330653932646333636136633764 May 13 06:55:11.779000 audit[4265]: AVC avc: denied { bpf } for pid=4265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.779000 audit[4265]: AVC avc: denied { bpf } for pid=4265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.779000 audit[4265]: AVC avc: denied { bpf } for pid=4265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.779000 audit[4265]: AVC avc: denied { perfmon } for pid=4265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.779000 audit[4265]: AVC avc: denied { perfmon } for pid=4265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.779000 audit[4265]: AVC avc: denied { perfmon } for pid=4265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.779000 audit[4265]: AVC avc: denied { perfmon } for pid=4265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.779000 audit[4265]: AVC avc: denied { perfmon } for pid=4265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.779000 audit[4265]: AVC avc: denied { bpf } for pid=4265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.779000 audit[4265]: AVC avc: denied { bpf } for pid=4265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.779000 audit: BPF prog-id=202 op=LOAD May 13 06:55:11.779000 audit[4265]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001e1a30 items=0 ppid=4255 pid=4265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:11.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331326231656363386562303034376330653932646333636136633764 May 13 06:55:11.780000 audit[4265]: AVC avc: denied { bpf } for pid=4265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.780000 audit[4265]: AVC avc: denied { bpf } for pid=4265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.780000 audit[4265]: AVC avc: denied { perfmon } for pid=4265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.780000 audit[4265]: AVC avc: denied { perfmon } for pid=4265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.780000 audit[4265]: AVC avc: denied { perfmon } for pid=4265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.780000 audit[4265]: AVC avc: denied { perfmon } for pid=4265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.780000 audit[4265]: AVC avc: denied { perfmon } for pid=4265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.780000 audit[4265]: AVC avc: denied { bpf } for pid=4265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.780000 audit[4265]: AVC avc: denied { bpf } for pid=4265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.780000 audit: BPF prog-id=203 op=LOAD May 13 06:55:11.780000 audit[4265]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001e1a78 items=0 ppid=4255 pid=4265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:11.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331326231656363386562303034376330653932646333636136633764 May 13 06:55:11.780000 audit: BPF prog-id=203 op=UNLOAD May 13 06:55:11.780000 audit: BPF prog-id=202 op=UNLOAD May 13 06:55:11.780000 audit[4265]: AVC avc: denied { bpf } for pid=4265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.780000 audit[4265]: AVC avc: denied { bpf } for pid=4265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.780000 audit[4265]: AVC avc: denied { bpf } for pid=4265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.780000 audit[4265]: AVC avc: denied { perfmon } for pid=4265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.780000 audit[4265]: AVC avc: denied { perfmon } for pid=4265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.780000 audit[4265]: AVC avc: denied { perfmon } for pid=4265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.780000 audit[4265]: AVC avc: denied { perfmon } for pid=4265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.780000 audit[4265]: AVC avc: denied { perfmon } for pid=4265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.780000 audit[4265]: AVC avc: denied { bpf } for pid=4265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.780000 audit[4265]: AVC avc: denied { bpf } for pid=4265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.780000 audit: BPF prog-id=204 op=LOAD May 13 06:55:11.780000 audit[4265]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001e1e88 items=0 ppid=4255 pid=4265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:11.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331326231656363386562303034376330653932646333636136633764 May 13 06:55:11.823214 env[1155]: time="2025-05-13T06:55:11.823140431Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-fbfdb4f49-mmbnh,Uid:e5c91341-a1bc-40c2-b30f-aea6483afd42,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd\"" May 13 06:55:11.827894 env[1155]: time="2025-05-13T06:55:11.827858322Z" level=info msg="CreateContainer within sandbox \"c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 06:55:11.850338 env[1155]: time="2025-05-13T06:55:11.850299738Z" level=info msg="CreateContainer within sandbox \"c12b1ecc8eb0047c0e92dc3ca6c7d2fef0a7019c5f26cc7616222a3c8038adcd\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"b721c52727a0487cf1aa78217ffee4a7ab517b00b2598ce9c2b2e8601e0ac2f9\"" May 13 06:55:11.852473 env[1155]: time="2025-05-13T06:55:11.852442739Z" level=info msg="StartContainer for \"b721c52727a0487cf1aa78217ffee4a7ab517b00b2598ce9c2b2e8601e0ac2f9\"" May 13 06:55:11.874267 systemd[1]: Started cri-containerd-b721c52727a0487cf1aa78217ffee4a7ab517b00b2598ce9c2b2e8601e0ac2f9.scope. May 13 06:55:11.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.894000 audit: BPF prog-id=205 op=LOAD May 13 06:55:11.895000 audit[4297]: AVC avc: denied { bpf } for pid=4297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4255 pid=4297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:11.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237323163353237323761303438376366316161373832313766666565 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { perfmon } for pid=4297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4255 pid=4297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:11.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237323163353237323761303438376366316161373832313766666565 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { bpf } for pid=4297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { bpf } for pid=4297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { bpf } for pid=4297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { perfmon } for pid=4297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { perfmon } for pid=4297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { perfmon } for pid=4297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { perfmon } for pid=4297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { perfmon } for pid=4297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { bpf } for pid=4297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { bpf } for pid=4297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit: BPF prog-id=206 op=LOAD May 13 06:55:11.895000 audit[4297]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000292d90 items=0 ppid=4255 pid=4297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:11.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237323163353237323761303438376366316161373832313766666565 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { bpf } for pid=4297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { bpf } for pid=4297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { perfmon } for pid=4297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { perfmon } for pid=4297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { perfmon } for pid=4297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { perfmon } for pid=4297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { perfmon } for pid=4297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { bpf } for pid=4297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { bpf } for pid=4297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit: BPF prog-id=207 op=LOAD May 13 06:55:11.895000 audit[4297]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000292dd8 items=0 ppid=4255 pid=4297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:11.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237323163353237323761303438376366316161373832313766666565 May 13 06:55:11.895000 audit: BPF prog-id=207 op=UNLOAD May 13 06:55:11.895000 audit: BPF prog-id=206 op=UNLOAD May 13 06:55:11.895000 audit[4297]: AVC avc: denied { bpf } for pid=4297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { bpf } for pid=4297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { bpf } for pid=4297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { perfmon } for pid=4297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { perfmon } for pid=4297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { perfmon } for pid=4297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { perfmon } for pid=4297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { perfmon } for pid=4297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { bpf } for pid=4297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit[4297]: AVC avc: denied { bpf } for pid=4297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:11.895000 audit: BPF prog-id=208 op=LOAD May 13 06:55:11.895000 audit[4297]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002931e8 items=0 ppid=4255 pid=4297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:11.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237323163353237323761303438376366316161373832313766666565 May 13 06:55:11.940394 env[1155]: time="2025-05-13T06:55:11.940305317Z" level=info msg="StartContainer for \"b721c52727a0487cf1aa78217ffee4a7ab517b00b2598ce9c2b2e8601e0ac2f9\" returns successfully" May 13 06:55:12.552384 kubelet[1935]: I0513 06:55:12.552340 1935 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-fbfdb4f49-mmbnh" podStartSLOduration=1.552323056 podStartE2EDuration="1.552323056s" podCreationTimestamp="2025-05-13 06:55:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 06:55:12.551087754 +0000 UTC m=+54.478465147" watchObservedRunningTime="2025-05-13 06:55:12.552323056 +0000 UTC m=+54.479700449" May 13 06:55:12.593000 audit[4329]: NETFILTER_CFG table=filter:120 family=2 entries=8 op=nft_register_rule pid=4329 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:12.593000 audit[4329]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe996b9f70 a2=0 a3=7ffe996b9f5c items=0 ppid=2110 pid=4329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:12.593000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:12.598000 audit[4329]: NETFILTER_CFG table=nat:121 family=2 entries=30 op=nft_register_rule pid=4329 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:12.598000 audit[4329]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe996b9f70 a2=0 a3=7ffe996b9f5c items=0 ppid=2110 pid=4329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:12.598000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:12.952132 systemd-networkd[971]: cali03d777b0d15: Gained IPv6LL May 13 06:55:13.023521 env[1155]: time="2025-05-13T06:55:13.023479839Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:13.025869 env[1155]: time="2025-05-13T06:55:13.025847727Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:13.029083 env[1155]: time="2025-05-13T06:55:13.029057724Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:13.031023 env[1155]: time="2025-05-13T06:55:13.031001110Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:13.031375 env[1155]: time="2025-05-13T06:55:13.031349540Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 13 06:55:13.033522 env[1155]: time="2025-05-13T06:55:13.033498791Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 13 06:55:13.034536 env[1155]: time="2025-05-13T06:55:13.034510984Z" level=info msg="CreateContainer within sandbox \"592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 13 06:55:13.034000 audit[4309]: AVC avc: denied { watch } for pid=4309 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_55_11.4127886896/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c848 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c416,c848 tclass=file permissive=0 May 13 06:55:13.034000 audit[4309]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f25860 a2=fc6 a3=0 items=0 ppid=4255 pid=4309 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c848 key=(null) May 13 06:55:13.034000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 06:55:13.055495 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2954178525.mount: Deactivated successfully. May 13 06:55:13.063833 env[1155]: time="2025-05-13T06:55:13.063791833Z" level=info msg="CreateContainer within sandbox \"592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"871296be33476a25039f57c434ec3afa545c52beacd094a0cd4aebf85eb4909a\"" May 13 06:55:13.064716 env[1155]: time="2025-05-13T06:55:13.064689889Z" level=info msg="StartContainer for \"871296be33476a25039f57c434ec3afa545c52beacd094a0cd4aebf85eb4909a\"" May 13 06:55:13.087647 systemd[1]: Started cri-containerd-871296be33476a25039f57c434ec3afa545c52beacd094a0cd4aebf85eb4909a.scope. May 13 06:55:13.116000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.116000 audit[4344]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1bf53c7018 items=0 ppid=3181 pid=4344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:13.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837313239366265333334373661323530333966353763343334656333 May 13 06:55:13.116000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.116000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.116000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.116000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.116000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.116000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.116000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.116000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.116000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.116000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.116000 audit: BPF prog-id=209 op=LOAD May 13 06:55:13.116000 audit[4344]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001fb708 items=0 ppid=3181 pid=4344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:13.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837313239366265333334373661323530333966353763343334656333 May 13 06:55:13.117000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.117000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.117000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.117000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.117000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.117000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.117000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.117000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.117000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.117000 audit: BPF prog-id=210 op=LOAD May 13 06:55:13.117000 audit[4344]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001fb758 items=0 ppid=3181 pid=4344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:13.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837313239366265333334373661323530333966353763343334656333 May 13 06:55:13.117000 audit: BPF prog-id=210 op=UNLOAD May 13 06:55:13.117000 audit: BPF prog-id=209 op=UNLOAD May 13 06:55:13.117000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.117000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.117000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.117000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.117000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.117000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.117000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.117000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.117000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.117000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.117000 audit: BPF prog-id=211 op=LOAD May 13 06:55:13.117000 audit[4344]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001fb7e8 items=0 ppid=3181 pid=4344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:13.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837313239366265333334373661323530333966353763343334656333 May 13 06:55:13.225437 env[1155]: time="2025-05-13T06:55:13.223192997Z" level=info msg="StartContainer for \"871296be33476a25039f57c434ec3afa545c52beacd094a0cd4aebf85eb4909a\" returns successfully" May 13 06:55:13.340074 kubelet[1935]: I0513 06:55:13.340026 1935 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 13 06:55:13.340509 kubelet[1935]: I0513 06:55:13.340455 1935 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 13 06:55:13.362128 systemd[1]: run-containerd-runc-k8s.io-871296be33476a25039f57c434ec3afa545c52beacd094a0cd4aebf85eb4909a-runc.tJw2rn.mount: Deactivated successfully. May 13 06:55:13.523977 env[1155]: time="2025-05-13T06:55:13.523766569Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:13.529572 env[1155]: time="2025-05-13T06:55:13.529518333Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:13.536502 env[1155]: time="2025-05-13T06:55:13.536420708Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:13.541615 kubelet[1935]: I0513 06:55:13.541579 1935 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 06:55:13.553122 env[1155]: time="2025-05-13T06:55:13.553053438Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:13.556548 env[1155]: time="2025-05-13T06:55:13.555127760Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 13 06:55:13.563115 env[1155]: time="2025-05-13T06:55:13.562521501Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 13 06:55:13.564168 env[1155]: time="2025-05-13T06:55:13.564099419Z" level=info msg="CreateContainer within sandbox \"d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 06:55:13.584020 kubelet[1935]: I0513 06:55:13.583898 1935 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-8fghh" podStartSLOduration=30.209430809 podStartE2EDuration="41.583847273s" podCreationTimestamp="2025-05-13 06:54:32 +0000 UTC" firstStartedPulling="2025-05-13 06:55:01.658333838 +0000 UTC m=+43.585711231" lastFinishedPulling="2025-05-13 06:55:13.032750302 +0000 UTC m=+54.960127695" observedRunningTime="2025-05-13 06:55:13.581878112 +0000 UTC m=+55.509255555" watchObservedRunningTime="2025-05-13 06:55:13.583847273 +0000 UTC m=+55.511224716" May 13 06:55:13.608136 env[1155]: time="2025-05-13T06:55:13.608082844Z" level=info msg="CreateContainer within sandbox \"d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"cd00a0ba1675bbecb0b304fddeb10f2520129f67626abb471440901a5aa2737d\"" May 13 06:55:13.608810 env[1155]: time="2025-05-13T06:55:13.608779373Z" level=info msg="StartContainer for \"cd00a0ba1675bbecb0b304fddeb10f2520129f67626abb471440901a5aa2737d\"" May 13 06:55:13.636521 systemd[1]: Started cri-containerd-cd00a0ba1675bbecb0b304fddeb10f2520129f67626abb471440901a5aa2737d.scope. May 13 06:55:13.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.661000 audit: BPF prog-id=212 op=LOAD May 13 06:55:13.662000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.662000 audit[4381]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4019 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:13.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364303061306261313637356262656362306233303466646465623130 May 13 06:55:13.663000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.663000 audit[4381]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4019 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:13.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364303061306261313637356262656362306233303466646465623130 May 13 06:55:13.663000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.663000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.663000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.663000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.663000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.663000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.663000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.663000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.663000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.663000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.663000 audit: BPF prog-id=213 op=LOAD May 13 06:55:13.663000 audit[4381]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000323960 items=0 ppid=4019 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:13.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364303061306261313637356262656362306233303466646465623130 May 13 06:55:13.663000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.663000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.663000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.663000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.663000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.663000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.663000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.663000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.663000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.663000 audit: BPF prog-id=214 op=LOAD May 13 06:55:13.663000 audit[4381]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003239a8 items=0 ppid=4019 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:13.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364303061306261313637356262656362306233303466646465623130 May 13 06:55:13.664000 audit: BPF prog-id=214 op=UNLOAD May 13 06:55:13.664000 audit: BPF prog-id=213 op=UNLOAD May 13 06:55:13.664000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.664000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.664000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.664000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.664000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.664000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.664000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.664000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.664000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.664000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:13.664000 audit: BPF prog-id=215 op=LOAD May 13 06:55:13.664000 audit[4381]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000323db8 items=0 ppid=4019 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:13.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364303061306261313637356262656362306233303466646465623130 May 13 06:55:13.701712 env[1155]: time="2025-05-13T06:55:13.701648977Z" level=info msg="StartContainer for \"cd00a0ba1675bbecb0b304fddeb10f2520129f67626abb471440901a5aa2737d\" returns successfully" May 13 06:55:14.357991 systemd[1]: run-containerd-runc-k8s.io-cd00a0ba1675bbecb0b304fddeb10f2520129f67626abb471440901a5aa2737d-runc.XoWdvb.mount: Deactivated successfully. May 13 06:55:14.462000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:55:14.462000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0008ead80 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:55:14.462000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:55:14.462000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:55:14.462000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002d9e920 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:55:14.462000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:55:14.588000 audit[4412]: NETFILTER_CFG table=filter:122 family=2 entries=8 op=nft_register_rule pid=4412 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:14.588000 audit[4412]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe55ca6ad0 a2=0 a3=7ffe55ca6abc items=0 ppid=2110 pid=4412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:14.588000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:14.591000 audit[4412]: NETFILTER_CFG table=nat:123 family=2 entries=30 op=nft_register_rule pid=4412 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:14.591000 audit[4412]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe55ca6ad0 a2=0 a3=7ffe55ca6abc items=0 ppid=2110 pid=4412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:14.591000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:14.804000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:55:14.804000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00f8d8e70 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:55:14.804000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:55:14.805000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:55:14.805000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00f8d8f00 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:55:14.805000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:55:14.804000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:55:14.804000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00f2d68a0 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:55:14.804000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:55:14.809000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:55:14.809000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c0100083f0 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:55:14.809000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:55:14.855000 audit[4392]: AVC avc: denied { watch } for pid=4392 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_54_48.2466707000/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c342 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c59,c342 tclass=file permissive=0 May 13 06:55:14.855000 audit[4392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0003e0f80 a2=fc6 a3=0 items=0 ppid=4019 pid=4392 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c342 key=(null) May 13 06:55:14.855000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 06:55:14.864000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:55:14.864000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00f2d6b80 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:55:14.864000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:55:14.864000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:55:14.864000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00f8d9aa0 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:55:14.864000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:55:15.555202 kubelet[1935]: I0513 06:55:15.555151 1935 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 06:55:17.324528 env[1155]: time="2025-05-13T06:55:17.324450742Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:17.327351 env[1155]: time="2025-05-13T06:55:17.327293975Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:17.330175 env[1155]: time="2025-05-13T06:55:17.330136888Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:17.332812 env[1155]: time="2025-05-13T06:55:17.332762002Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:17.333748 env[1155]: time="2025-05-13T06:55:17.333722902Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 13 06:55:17.342797 env[1155]: time="2025-05-13T06:55:17.342739107Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 13 06:55:17.387704 env[1155]: time="2025-05-13T06:55:17.387502449Z" level=info msg="CreateContainer within sandbox \"9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 13 06:55:17.413184 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4017797201.mount: Deactivated successfully. May 13 06:55:17.422688 env[1155]: time="2025-05-13T06:55:17.422653621Z" level=info msg="CreateContainer within sandbox \"9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937\"" May 13 06:55:17.423600 env[1155]: time="2025-05-13T06:55:17.423575904Z" level=info msg="StartContainer for \"65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937\"" May 13 06:55:17.459778 systemd[1]: Started cri-containerd-65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937.scope. May 13 06:55:17.482641 kernel: kauditd_printk_skb: 258 callbacks suppressed May 13 06:55:17.482738 kernel: audit: type=1400 audit(1747119317.475:1328): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.482768 kernel: audit: type=1400 audit(1747119317.475:1329): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.491673 kernel: audit: type=1400 audit(1747119317.475:1330): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.496085 kernel: audit: type=1400 audit(1747119317.476:1331): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.500702 kernel: audit: type=1400 audit(1747119317.476:1332): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.506931 kernel: audit: type=1400 audit(1747119317.476:1333): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.520441 kernel: audit: type=1400 audit(1747119317.476:1334): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.520486 kernel: audit: type=1400 audit(1747119317.476:1335): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.525129 kernel: audit: type=1400 audit(1747119317.476:1336): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.529849 kernel: audit: type=1400 audit(1747119317.481:1337): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.481000 audit: BPF prog-id=216 op=LOAD May 13 06:55:17.481000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.481000 audit[4425]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4073 pid=4425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:17.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635663933626435333863646637643539363433376230613262653032 May 13 06:55:17.481000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.481000 audit[4425]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4073 pid=4425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:17.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635663933626435333863646637643539363433376230613262653032 May 13 06:55:17.481000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.481000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.481000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.481000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.481000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.481000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.481000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.481000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.481000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.481000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.481000 audit: BPF prog-id=217 op=LOAD May 13 06:55:17.481000 audit[4425]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000313270 items=0 ppid=4073 pid=4425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:17.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635663933626435333863646637643539363433376230613262653032 May 13 06:55:17.490000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.490000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.490000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.490000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.490000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.490000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.490000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.490000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.490000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.490000 audit: BPF prog-id=218 op=LOAD May 13 06:55:17.490000 audit[4425]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000108458 items=0 ppid=4073 pid=4425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:17.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635663933626435333863646637643539363433376230613262653032 May 13 06:55:17.495000 audit: BPF prog-id=218 op=UNLOAD May 13 06:55:17.495000 audit: BPF prog-id=217 op=UNLOAD May 13 06:55:17.495000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.495000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.495000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.495000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.495000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.495000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.495000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.495000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.495000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.495000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.495000 audit: BPF prog-id=219 op=LOAD May 13 06:55:17.495000 audit[4425]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000108868 items=0 ppid=4073 pid=4425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:17.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635663933626435333863646637643539363433376230613262653032 May 13 06:55:17.740399 env[1155]: time="2025-05-13T06:55:17.740313684Z" level=info msg="StartContainer for \"65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937\" returns successfully" May 13 06:55:17.834094 env[1155]: time="2025-05-13T06:55:17.834014857Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:17.836849 env[1155]: time="2025-05-13T06:55:17.836793327Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:17.839574 env[1155]: time="2025-05-13T06:55:17.839545392Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:17.842754 env[1155]: time="2025-05-13T06:55:17.842732522Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 06:55:17.844191 env[1155]: time="2025-05-13T06:55:17.844127358Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 13 06:55:17.851513 env[1155]: time="2025-05-13T06:55:17.851448556Z" level=info msg="CreateContainer within sandbox \"f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 06:55:17.872168 env[1155]: time="2025-05-13T06:55:17.872089581Z" level=info msg="CreateContainer within sandbox \"f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"2f3eeaa27258db04780e18b86c137a0a75a9c4025f4922bbbb4f9acbabdc2282\"" May 13 06:55:17.874005 env[1155]: time="2025-05-13T06:55:17.873971864Z" level=info msg="StartContainer for \"2f3eeaa27258db04780e18b86c137a0a75a9c4025f4922bbbb4f9acbabdc2282\"" May 13 06:55:17.906603 systemd[1]: Started cri-containerd-2f3eeaa27258db04780e18b86c137a0a75a9c4025f4922bbbb4f9acbabdc2282.scope. May 13 06:55:17.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.922000 audit: BPF prog-id=220 op=LOAD May 13 06:55:17.923000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4121 pid=4459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:17.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266336565616132373235386462303437383065313862383663313337 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4121 pid=4459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:17.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266336565616132373235386462303437383065313862383663313337 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit: BPF prog-id=221 op=LOAD May 13 06:55:17.923000 audit[4459]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000295830 items=0 ppid=4121 pid=4459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:17.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266336565616132373235386462303437383065313862383663313337 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit: BPF prog-id=222 op=LOAD May 13 06:55:17.923000 audit[4459]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000295878 items=0 ppid=4121 pid=4459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:17.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266336565616132373235386462303437383065313862383663313337 May 13 06:55:17.923000 audit: BPF prog-id=222 op=UNLOAD May 13 06:55:17.923000 audit: BPF prog-id=221 op=UNLOAD May 13 06:55:17.923000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { perfmon } for pid=4459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit[4459]: AVC avc: denied { bpf } for pid=4459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:17.923000 audit: BPF prog-id=223 op=LOAD May 13 06:55:17.923000 audit[4459]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000295c88 items=0 ppid=4121 pid=4459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:17.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266336565616132373235386462303437383065313862383663313337 May 13 06:55:17.959902 env[1155]: time="2025-05-13T06:55:17.959844626Z" level=info msg="StartContainer for \"2f3eeaa27258db04780e18b86c137a0a75a9c4025f4922bbbb4f9acbabdc2282\" returns successfully" May 13 06:55:18.221887 env[1155]: time="2025-05-13T06:55:18.221847235Z" level=info msg="StopPodSandbox for \"b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224\"" May 13 06:55:18.337042 env[1155]: 2025-05-13 06:55:18.287 [WARNING][4506] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"a7244bdd-6814-4742-bcde-9ccc6e210d60", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447", Pod:"coredns-668d6bf9bc-6jrqx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.20.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali558875d5c2d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:18.337042 env[1155]: 2025-05-13 06:55:18.288 [INFO][4506] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" May 13 06:55:18.337042 env[1155]: 2025-05-13 06:55:18.288 [INFO][4506] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" iface="eth0" netns="" May 13 06:55:18.337042 env[1155]: 2025-05-13 06:55:18.288 [INFO][4506] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" May 13 06:55:18.337042 env[1155]: 2025-05-13 06:55:18.288 [INFO][4506] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" May 13 06:55:18.337042 env[1155]: 2025-05-13 06:55:18.321 [INFO][4513] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" HandleID="k8s-pod-network.b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-eth0" May 13 06:55:18.337042 env[1155]: 2025-05-13 06:55:18.321 [INFO][4513] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:18.337042 env[1155]: 2025-05-13 06:55:18.321 [INFO][4513] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:18.337042 env[1155]: 2025-05-13 06:55:18.332 [WARNING][4513] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" HandleID="k8s-pod-network.b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-eth0" May 13 06:55:18.337042 env[1155]: 2025-05-13 06:55:18.332 [INFO][4513] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" HandleID="k8s-pod-network.b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-eth0" May 13 06:55:18.337042 env[1155]: 2025-05-13 06:55:18.334 [INFO][4513] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:18.337042 env[1155]: 2025-05-13 06:55:18.335 [INFO][4506] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" May 13 06:55:18.337980 env[1155]: time="2025-05-13T06:55:18.337068333Z" level=info msg="TearDown network for sandbox \"b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224\" successfully" May 13 06:55:18.337980 env[1155]: time="2025-05-13T06:55:18.337097764Z" level=info msg="StopPodSandbox for \"b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224\" returns successfully" May 13 06:55:18.338300 env[1155]: time="2025-05-13T06:55:18.338267322Z" level=info msg="RemovePodSandbox for \"b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224\"" May 13 06:55:18.338418 env[1155]: time="2025-05-13T06:55:18.338377363Z" level=info msg="Forcibly stopping sandbox \"b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224\"" May 13 06:55:18.437733 env[1155]: 2025-05-13 06:55:18.395 [WARNING][4532] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"a7244bdd-6814-4742-bcde-9ccc6e210d60", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"058f9526edc3acbb4a7f109a4e127c0ab7252621442e062587fd10445e211447", Pod:"coredns-668d6bf9bc-6jrqx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.20.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali558875d5c2d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:18.437733 env[1155]: 2025-05-13 06:55:18.395 [INFO][4532] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" May 13 06:55:18.437733 env[1155]: 2025-05-13 06:55:18.395 [INFO][4532] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" iface="eth0" netns="" May 13 06:55:18.437733 env[1155]: 2025-05-13 06:55:18.395 [INFO][4532] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" May 13 06:55:18.437733 env[1155]: 2025-05-13 06:55:18.395 [INFO][4532] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" May 13 06:55:18.437733 env[1155]: 2025-05-13 06:55:18.419 [INFO][4539] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" HandleID="k8s-pod-network.b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-eth0" May 13 06:55:18.437733 env[1155]: 2025-05-13 06:55:18.419 [INFO][4539] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:18.437733 env[1155]: 2025-05-13 06:55:18.419 [INFO][4539] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:18.437733 env[1155]: 2025-05-13 06:55:18.431 [WARNING][4539] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" HandleID="k8s-pod-network.b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-eth0" May 13 06:55:18.437733 env[1155]: 2025-05-13 06:55:18.431 [INFO][4539] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" HandleID="k8s-pod-network.b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--6jrqx-eth0" May 13 06:55:18.437733 env[1155]: 2025-05-13 06:55:18.433 [INFO][4539] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:18.437733 env[1155]: 2025-05-13 06:55:18.436 [INFO][4532] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224" May 13 06:55:18.438352 env[1155]: time="2025-05-13T06:55:18.438318949Z" level=info msg="TearDown network for sandbox \"b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224\" successfully" May 13 06:55:18.446100 env[1155]: time="2025-05-13T06:55:18.446071617Z" level=info msg="RemovePodSandbox \"b1318cbb46061caad3e7c911e9311ceae0cadb538b065037b0787633b8a3d224\" returns successfully" May 13 06:55:18.446702 env[1155]: time="2025-05-13T06:55:18.446666113Z" level=info msg="StopPodSandbox for \"d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c\"" May 13 06:55:18.539780 env[1155]: 2025-05-13 06:55:18.487 [WARNING][4557] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f8774101-e6a2-4977-be65-5647d581d80d", ResourceVersion:"931", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8", Pod:"csi-node-driver-8fghh", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.20.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9ad80842375", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:18.539780 env[1155]: 2025-05-13 06:55:18.487 [INFO][4557] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" May 13 06:55:18.539780 env[1155]: 2025-05-13 06:55:18.487 [INFO][4557] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" iface="eth0" netns="" May 13 06:55:18.539780 env[1155]: 2025-05-13 06:55:18.487 [INFO][4557] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" May 13 06:55:18.539780 env[1155]: 2025-05-13 06:55:18.487 [INFO][4557] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" May 13 06:55:18.539780 env[1155]: 2025-05-13 06:55:18.528 [INFO][4564] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" HandleID="k8s-pod-network.d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-eth0" May 13 06:55:18.539780 env[1155]: 2025-05-13 06:55:18.528 [INFO][4564] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:18.539780 env[1155]: 2025-05-13 06:55:18.528 [INFO][4564] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:18.539780 env[1155]: 2025-05-13 06:55:18.536 [WARNING][4564] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" HandleID="k8s-pod-network.d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-eth0" May 13 06:55:18.539780 env[1155]: 2025-05-13 06:55:18.536 [INFO][4564] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" HandleID="k8s-pod-network.d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-eth0" May 13 06:55:18.539780 env[1155]: 2025-05-13 06:55:18.537 [INFO][4564] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:18.539780 env[1155]: 2025-05-13 06:55:18.538 [INFO][4557] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" May 13 06:55:18.540414 env[1155]: time="2025-05-13T06:55:18.540382542Z" level=info msg="TearDown network for sandbox \"d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c\" successfully" May 13 06:55:18.540493 env[1155]: time="2025-05-13T06:55:18.540474813Z" level=info msg="StopPodSandbox for \"d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c\" returns successfully" May 13 06:55:18.542040 env[1155]: time="2025-05-13T06:55:18.541015935Z" level=info msg="RemovePodSandbox for \"d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c\"" May 13 06:55:18.542040 env[1155]: time="2025-05-13T06:55:18.541057698Z" level=info msg="Forcibly stopping sandbox \"d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c\"" May 13 06:55:18.626517 env[1155]: 2025-05-13 06:55:18.586 [WARNING][4583] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f8774101-e6a2-4977-be65-5647d581d80d", ResourceVersion:"931", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"592e013c06e75c9fe6983726e9f7e3559a46b05e2c561470344087817f1a41f8", Pod:"csi-node-driver-8fghh", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.20.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9ad80842375", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:18.626517 env[1155]: 2025-05-13 06:55:18.586 [INFO][4583] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" May 13 06:55:18.626517 env[1155]: 2025-05-13 06:55:18.586 [INFO][4583] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" iface="eth0" netns="" May 13 06:55:18.626517 env[1155]: 2025-05-13 06:55:18.586 [INFO][4583] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" May 13 06:55:18.626517 env[1155]: 2025-05-13 06:55:18.586 [INFO][4583] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" May 13 06:55:18.626517 env[1155]: 2025-05-13 06:55:18.614 [INFO][4590] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" HandleID="k8s-pod-network.d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-eth0" May 13 06:55:18.626517 env[1155]: 2025-05-13 06:55:18.614 [INFO][4590] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:18.626517 env[1155]: 2025-05-13 06:55:18.615 [INFO][4590] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:18.626517 env[1155]: 2025-05-13 06:55:18.622 [WARNING][4590] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" HandleID="k8s-pod-network.d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-eth0" May 13 06:55:18.626517 env[1155]: 2025-05-13 06:55:18.622 [INFO][4590] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" HandleID="k8s-pod-network.d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-csi--node--driver--8fghh-eth0" May 13 06:55:18.626517 env[1155]: 2025-05-13 06:55:18.624 [INFO][4590] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:18.626517 env[1155]: 2025-05-13 06:55:18.625 [INFO][4583] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c" May 13 06:55:18.627200 env[1155]: time="2025-05-13T06:55:18.627134275Z" level=info msg="TearDown network for sandbox \"d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c\" successfully" May 13 06:55:18.632350 env[1155]: time="2025-05-13T06:55:18.632308871Z" level=info msg="RemovePodSandbox \"d17265526ad75f9bfd9d7cfa32389a88b4d9ae8372b18fc02f6ea7d2f64cc15c\" returns successfully" May 13 06:55:18.632860 env[1155]: time="2025-05-13T06:55:18.632837893Z" level=info msg="StopPodSandbox for \"cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67\"" May 13 06:55:18.723959 env[1155]: 2025-05-13 06:55:18.680 [WARNING][4608] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-eth0", GenerateName:"calico-apiserver-fbfdb4f49-", Namespace:"calico-apiserver", SelfLink:"", UID:"59af98d4-a46a-486a-ae5b-da7f7fb98080", ResourceVersion:"886", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"fbfdb4f49", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e", Pod:"calico-apiserver-fbfdb4f49-tw2jz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.20.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0191a535426", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:18.723959 env[1155]: 2025-05-13 06:55:18.680 [INFO][4608] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" May 13 06:55:18.723959 env[1155]: 2025-05-13 06:55:18.680 [INFO][4608] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" iface="eth0" netns="" May 13 06:55:18.723959 env[1155]: 2025-05-13 06:55:18.680 [INFO][4608] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" May 13 06:55:18.723959 env[1155]: 2025-05-13 06:55:18.680 [INFO][4608] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" May 13 06:55:18.723959 env[1155]: 2025-05-13 06:55:18.710 [INFO][4615] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" HandleID="k8s-pod-network.cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-eth0" May 13 06:55:18.723959 env[1155]: 2025-05-13 06:55:18.710 [INFO][4615] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:18.723959 env[1155]: 2025-05-13 06:55:18.710 [INFO][4615] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:18.723959 env[1155]: 2025-05-13 06:55:18.718 [WARNING][4615] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" HandleID="k8s-pod-network.cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-eth0" May 13 06:55:18.723959 env[1155]: 2025-05-13 06:55:18.718 [INFO][4615] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" HandleID="k8s-pod-network.cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-eth0" May 13 06:55:18.723959 env[1155]: 2025-05-13 06:55:18.721 [INFO][4615] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:18.723959 env[1155]: 2025-05-13 06:55:18.722 [INFO][4608] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" May 13 06:55:18.724486 env[1155]: time="2025-05-13T06:55:18.723988922Z" level=info msg="TearDown network for sandbox \"cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67\" successfully" May 13 06:55:18.724486 env[1155]: time="2025-05-13T06:55:18.724032869Z" level=info msg="StopPodSandbox for \"cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67\" returns successfully" May 13 06:55:18.726328 env[1155]: time="2025-05-13T06:55:18.726093499Z" level=info msg="RemovePodSandbox for \"cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67\"" May 13 06:55:18.726552 env[1155]: time="2025-05-13T06:55:18.726486444Z" level=info msg="Forcibly stopping sandbox \"cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67\"" May 13 06:55:18.778526 env[1155]: time="2025-05-13T06:55:18.778351993Z" level=info msg="StopContainer for \"2f3eeaa27258db04780e18b86c137a0a75a9c4025f4922bbbb4f9acbabdc2282\" with timeout 30 (s)" May 13 06:55:18.781415 env[1155]: time="2025-05-13T06:55:18.781381261Z" level=info msg="Stop container \"2f3eeaa27258db04780e18b86c137a0a75a9c4025f4922bbbb4f9acbabdc2282\" with signal terminated" May 13 06:55:18.808024 kubelet[1935]: I0513 06:55:18.805582 1935 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-579977495-4vp7r" podStartSLOduration=40.228257264 podStartE2EDuration="47.805479219s" podCreationTimestamp="2025-05-13 06:54:31 +0000 UTC" firstStartedPulling="2025-05-13 06:55:05.981074642 +0000 UTC m=+47.908452035" lastFinishedPulling="2025-05-13 06:55:13.558296547 +0000 UTC m=+55.485673990" observedRunningTime="2025-05-13 06:55:14.569498474 +0000 UTC m=+56.496875917" watchObservedRunningTime="2025-05-13 06:55:18.805479219 +0000 UTC m=+60.732856632" May 13 06:55:18.824317 systemd[1]: run-containerd-runc-k8s.io-65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937-runc.pAb2KX.mount: Deactivated successfully. May 13 06:55:18.830445 systemd[1]: cri-containerd-2f3eeaa27258db04780e18b86c137a0a75a9c4025f4922bbbb4f9acbabdc2282.scope: Deactivated successfully. May 13 06:55:18.829000 audit: BPF prog-id=220 op=UNLOAD May 13 06:55:18.834000 audit: BPF prog-id=223 op=UNLOAD May 13 06:55:18.854880 kubelet[1935]: I0513 06:55:18.854242 1935 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-579977495-p7jjc" podStartSLOduration=36.213978456 podStartE2EDuration="47.854226394s" podCreationTimestamp="2025-05-13 06:54:31 +0000 UTC" firstStartedPulling="2025-05-13 06:55:06.205311178 +0000 UTC m=+48.132688582" lastFinishedPulling="2025-05-13 06:55:17.845559086 +0000 UTC m=+59.772936520" observedRunningTime="2025-05-13 06:55:18.81622985 +0000 UTC m=+60.743607243" watchObservedRunningTime="2025-05-13 06:55:18.854226394 +0000 UTC m=+60.781603787" May 13 06:55:18.854880 kubelet[1935]: I0513 06:55:18.854644 1935 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-55c78455dd-hxgrr" podStartSLOduration=35.660519529 podStartE2EDuration="46.854637901s" podCreationTimestamp="2025-05-13 06:54:32 +0000 UTC" firstStartedPulling="2025-05-13 06:55:06.148105509 +0000 UTC m=+48.075482902" lastFinishedPulling="2025-05-13 06:55:17.342223831 +0000 UTC m=+59.269601274" observedRunningTime="2025-05-13 06:55:18.854023621 +0000 UTC m=+60.781401014" watchObservedRunningTime="2025-05-13 06:55:18.854637901 +0000 UTC m=+60.782015294" May 13 06:55:18.858000 audit[4663]: NETFILTER_CFG table=filter:124 family=2 entries=8 op=nft_register_rule pid=4663 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:18.858000 audit[4663]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc45950fb0 a2=0 a3=7ffc45950f9c items=0 ppid=2110 pid=4663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:18.858000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:18.863000 audit[4663]: NETFILTER_CFG table=nat:125 family=2 entries=30 op=nft_register_rule pid=4663 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:18.863000 audit[4663]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc45950fb0 a2=0 a3=7ffc45950f9c items=0 ppid=2110 pid=4663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:18.863000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:18.928088 env[1155]: 2025-05-13 06:55:18.785 [WARNING][4635] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-eth0", GenerateName:"calico-apiserver-fbfdb4f49-", Namespace:"calico-apiserver", SelfLink:"", UID:"59af98d4-a46a-486a-ae5b-da7f7fb98080", ResourceVersion:"886", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"fbfdb4f49", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"871a9d58d94ec9a2127bc19ed92c4927f6b5e1dffbba6e6be307ef3484b4559e", Pod:"calico-apiserver-fbfdb4f49-tw2jz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.20.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0191a535426", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:18.928088 env[1155]: 2025-05-13 06:55:18.786 [INFO][4635] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" May 13 06:55:18.928088 env[1155]: 2025-05-13 06:55:18.786 [INFO][4635] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" iface="eth0" netns="" May 13 06:55:18.928088 env[1155]: 2025-05-13 06:55:18.786 [INFO][4635] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" May 13 06:55:18.928088 env[1155]: 2025-05-13 06:55:18.786 [INFO][4635] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" May 13 06:55:18.928088 env[1155]: 2025-05-13 06:55:18.905 [INFO][4646] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" HandleID="k8s-pod-network.cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-eth0" May 13 06:55:18.928088 env[1155]: 2025-05-13 06:55:18.905 [INFO][4646] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:18.928088 env[1155]: 2025-05-13 06:55:18.905 [INFO][4646] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:18.928088 env[1155]: 2025-05-13 06:55:18.922 [WARNING][4646] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" HandleID="k8s-pod-network.cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-eth0" May 13 06:55:18.928088 env[1155]: 2025-05-13 06:55:18.922 [INFO][4646] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" HandleID="k8s-pod-network.cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--fbfdb4f49--tw2jz-eth0" May 13 06:55:18.928088 env[1155]: 2025-05-13 06:55:18.926 [INFO][4646] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:18.928088 env[1155]: 2025-05-13 06:55:18.927 [INFO][4635] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67" May 13 06:55:18.928727 env[1155]: time="2025-05-13T06:55:18.928697150Z" level=info msg="TearDown network for sandbox \"cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67\" successfully" May 13 06:55:18.938031 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2f3eeaa27258db04780e18b86c137a0a75a9c4025f4922bbbb4f9acbabdc2282-rootfs.mount: Deactivated successfully. May 13 06:55:18.946050 env[1155]: time="2025-05-13T06:55:18.945990181Z" level=info msg="RemovePodSandbox \"cb0fad98977b5e0871b02290c45f76f311b437f63ff386732174e23709a4cc67\" returns successfully" May 13 06:55:18.946648 env[1155]: time="2025-05-13T06:55:18.946525744Z" level=info msg="StopPodSandbox for \"fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5\"" May 13 06:55:18.947398 env[1155]: time="2025-05-13T06:55:18.947263760Z" level=info msg="shim disconnected" id=2f3eeaa27258db04780e18b86c137a0a75a9c4025f4922bbbb4f9acbabdc2282 May 13 06:55:18.947398 env[1155]: time="2025-05-13T06:55:18.947303039Z" level=warning msg="cleaning up after shim disconnected" id=2f3eeaa27258db04780e18b86c137a0a75a9c4025f4922bbbb4f9acbabdc2282 namespace=k8s.io May 13 06:55:18.947398 env[1155]: time="2025-05-13T06:55:18.947312925Z" level=info msg="cleaning up dead shim" May 13 06:55:18.962433 env[1155]: time="2025-05-13T06:55:18.962376201Z" level=warning msg="cleanup warnings time=\"2025-05-13T06:55:18Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4688 runtime=io.containerd.runc.v2\n" May 13 06:55:18.966255 env[1155]: time="2025-05-13T06:55:18.966215180Z" level=info msg="StopContainer for \"2f3eeaa27258db04780e18b86c137a0a75a9c4025f4922bbbb4f9acbabdc2282\" returns successfully" May 13 06:55:18.966755 env[1155]: time="2025-05-13T06:55:18.966728535Z" level=info msg="StopPodSandbox for \"f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb\"" May 13 06:55:18.966822 env[1155]: time="2025-05-13T06:55:18.966790953Z" level=info msg="Container to stop \"2f3eeaa27258db04780e18b86c137a0a75a9c4025f4922bbbb4f9acbabdc2282\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 13 06:55:18.979557 systemd[1]: cri-containerd-f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb.scope: Deactivated successfully. May 13 06:55:18.978000 audit: BPF prog-id=193 op=UNLOAD May 13 06:55:18.982000 audit: BPF prog-id=196 op=UNLOAD May 13 06:55:19.027369 env[1155]: time="2025-05-13T06:55:19.027314095Z" level=info msg="shim disconnected" id=f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb May 13 06:55:19.027369 env[1155]: time="2025-05-13T06:55:19.027365004Z" level=warning msg="cleaning up after shim disconnected" id=f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb namespace=k8s.io May 13 06:55:19.027369 env[1155]: time="2025-05-13T06:55:19.027376043Z" level=info msg="cleaning up dead shim" May 13 06:55:19.042096 env[1155]: time="2025-05-13T06:55:19.041792155Z" level=warning msg="cleanup warnings time=\"2025-05-13T06:55:19Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4743 runtime=io.containerd.runc.v2\n" May 13 06:55:19.047262 env[1155]: 2025-05-13 06:55:19.004 [WARNING][4713] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0", GenerateName:"calico-kube-controllers-55c78455dd-", Namespace:"calico-system", SelfLink:"", UID:"9f406868-14be-4f07-a347-37e45f4acb44", ResourceVersion:"963", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55c78455dd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279", Pod:"calico-kube-controllers-55c78455dd-hxgrr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.20.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3ab6b54ab96", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:19.047262 env[1155]: 2025-05-13 06:55:19.004 [INFO][4713] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" May 13 06:55:19.047262 env[1155]: 2025-05-13 06:55:19.004 [INFO][4713] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" iface="eth0" netns="" May 13 06:55:19.047262 env[1155]: 2025-05-13 06:55:19.004 [INFO][4713] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" May 13 06:55:19.047262 env[1155]: 2025-05-13 06:55:19.004 [INFO][4713] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" May 13 06:55:19.047262 env[1155]: 2025-05-13 06:55:19.034 [INFO][4731] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" HandleID="k8s-pod-network.fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:55:19.047262 env[1155]: 2025-05-13 06:55:19.034 [INFO][4731] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:19.047262 env[1155]: 2025-05-13 06:55:19.034 [INFO][4731] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:19.047262 env[1155]: 2025-05-13 06:55:19.042 [WARNING][4731] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" HandleID="k8s-pod-network.fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:55:19.047262 env[1155]: 2025-05-13 06:55:19.042 [INFO][4731] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" HandleID="k8s-pod-network.fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:55:19.047262 env[1155]: 2025-05-13 06:55:19.044 [INFO][4731] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:19.047262 env[1155]: 2025-05-13 06:55:19.046 [INFO][4713] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" May 13 06:55:19.047715 env[1155]: time="2025-05-13T06:55:19.047273386Z" level=info msg="TearDown network for sandbox \"fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5\" successfully" May 13 06:55:19.047715 env[1155]: time="2025-05-13T06:55:19.047299371Z" level=info msg="StopPodSandbox for \"fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5\" returns successfully" May 13 06:55:19.048168 env[1155]: time="2025-05-13T06:55:19.048130943Z" level=info msg="RemovePodSandbox for \"fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5\"" May 13 06:55:19.048223 env[1155]: time="2025-05-13T06:55:19.048162388Z" level=info msg="Forcibly stopping sandbox \"fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5\"" May 13 06:55:19.102873 systemd-networkd[971]: cali01b582543c9: Link DOWN May 13 06:55:19.102882 systemd-networkd[971]: cali01b582543c9: Lost carrier May 13 06:55:19.148000 audit[4814]: NETFILTER_CFG table=filter:126 family=2 entries=40 op=nft_register_rule pid=4814 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 06:55:19.148000 audit[4814]: SYSCALL arch=c000003e syscall=46 success=yes exit=5416 a0=3 a1=7ffc70e5f590 a2=0 a3=7ffc70e5f57c items=0 ppid=3241 pid=4814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:19.148000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 06:55:19.150000 audit[4814]: NETFILTER_CFG table=filter:127 family=2 entries=2 op=nft_unregister_chain pid=4814 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 06:55:19.150000 audit[4814]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc70e5f590 a2=0 a3=2d77662d696c6163 items=0 ppid=3241 pid=4814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:19.150000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 06:55:19.217818 env[1155]: 2025-05-13 06:55:19.101 [INFO][4776] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" May 13 06:55:19.217818 env[1155]: 2025-05-13 06:55:19.101 [INFO][4776] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" iface="eth0" netns="/var/run/netns/cni-4c1528a9-5297-d559-66cb-54904bcb0c87" May 13 06:55:19.217818 env[1155]: 2025-05-13 06:55:19.102 [INFO][4776] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" iface="eth0" netns="/var/run/netns/cni-4c1528a9-5297-d559-66cb-54904bcb0c87" May 13 06:55:19.217818 env[1155]: 2025-05-13 06:55:19.125 [INFO][4776] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" after=23.795019ms iface="eth0" netns="/var/run/netns/cni-4c1528a9-5297-d559-66cb-54904bcb0c87" May 13 06:55:19.217818 env[1155]: 2025-05-13 06:55:19.125 [INFO][4776] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" May 13 06:55:19.217818 env[1155]: 2025-05-13 06:55:19.125 [INFO][4776] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" May 13 06:55:19.217818 env[1155]: 2025-05-13 06:55:19.163 [INFO][4803] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" HandleID="k8s-pod-network.f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:55:19.217818 env[1155]: 2025-05-13 06:55:19.163 [INFO][4803] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:19.217818 env[1155]: 2025-05-13 06:55:19.163 [INFO][4803] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:19.217818 env[1155]: 2025-05-13 06:55:19.213 [INFO][4803] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" HandleID="k8s-pod-network.f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:55:19.217818 env[1155]: 2025-05-13 06:55:19.213 [INFO][4803] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" HandleID="k8s-pod-network.f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:55:19.217818 env[1155]: 2025-05-13 06:55:19.215 [INFO][4803] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:19.217818 env[1155]: 2025-05-13 06:55:19.216 [INFO][4776] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" May 13 06:55:19.218400 env[1155]: time="2025-05-13T06:55:19.217968936Z" level=info msg="TearDown network for sandbox \"f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb\" successfully" May 13 06:55:19.218400 env[1155]: time="2025-05-13T06:55:19.218002423Z" level=info msg="StopPodSandbox for \"f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb\" returns successfully" May 13 06:55:19.218462 env[1155]: time="2025-05-13T06:55:19.218412991Z" level=info msg="StopPodSandbox for \"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\"" May 13 06:55:19.233046 env[1155]: 2025-05-13 06:55:19.125 [WARNING][4790] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0", GenerateName:"calico-kube-controllers-55c78455dd-", Namespace:"calico-system", SelfLink:"", UID:"9f406868-14be-4f07-a347-37e45f4acb44", ResourceVersion:"963", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55c78455dd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279", Pod:"calico-kube-controllers-55c78455dd-hxgrr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.20.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3ab6b54ab96", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:19.233046 env[1155]: 2025-05-13 06:55:19.126 [INFO][4790] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" May 13 06:55:19.233046 env[1155]: 2025-05-13 06:55:19.126 [INFO][4790] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" iface="eth0" netns="" May 13 06:55:19.233046 env[1155]: 2025-05-13 06:55:19.126 [INFO][4790] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" May 13 06:55:19.233046 env[1155]: 2025-05-13 06:55:19.126 [INFO][4790] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" May 13 06:55:19.233046 env[1155]: 2025-05-13 06:55:19.168 [INFO][4808] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" HandleID="k8s-pod-network.fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:55:19.233046 env[1155]: 2025-05-13 06:55:19.168 [INFO][4808] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:19.233046 env[1155]: 2025-05-13 06:55:19.215 [INFO][4808] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:19.233046 env[1155]: 2025-05-13 06:55:19.227 [WARNING][4808] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" HandleID="k8s-pod-network.fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:55:19.233046 env[1155]: 2025-05-13 06:55:19.227 [INFO][4808] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" HandleID="k8s-pod-network.fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:55:19.233046 env[1155]: 2025-05-13 06:55:19.229 [INFO][4808] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:19.233046 env[1155]: 2025-05-13 06:55:19.231 [INFO][4790] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5" May 13 06:55:19.233787 env[1155]: time="2025-05-13T06:55:19.233749720Z" level=info msg="TearDown network for sandbox \"fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5\" successfully" May 13 06:55:19.243299 env[1155]: time="2025-05-13T06:55:19.243244969Z" level=info msg="RemovePodSandbox \"fd7337f46a1f880bb8c6b0eb0291d5b09be2c8da1dfa100e34843ae733ca99d5\" returns successfully" May 13 06:55:19.244109 env[1155]: time="2025-05-13T06:55:19.244072995Z" level=info msg="StopPodSandbox for \"9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f\"" May 13 06:55:19.330252 env[1155]: 2025-05-13 06:55:19.281 [WARNING][4834] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0", GenerateName:"calico-apiserver-579977495-", Namespace:"calico-apiserver", SelfLink:"", UID:"e4a0e09c-41bf-47f7-91e8-38610cbd0d23", ResourceVersion:"966", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"579977495", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb", Pod:"calico-apiserver-579977495-p7jjc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali01b582543c9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:19.330252 env[1155]: 2025-05-13 06:55:19.281 [INFO][4834] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" May 13 06:55:19.330252 env[1155]: 2025-05-13 06:55:19.281 [INFO][4834] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" iface="eth0" netns="" May 13 06:55:19.330252 env[1155]: 2025-05-13 06:55:19.281 [INFO][4834] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" May 13 06:55:19.330252 env[1155]: 2025-05-13 06:55:19.281 [INFO][4834] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" May 13 06:55:19.330252 env[1155]: 2025-05-13 06:55:19.313 [INFO][4860] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" HandleID="k8s-pod-network.6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:55:19.330252 env[1155]: 2025-05-13 06:55:19.314 [INFO][4860] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:19.330252 env[1155]: 2025-05-13 06:55:19.314 [INFO][4860] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:19.330252 env[1155]: 2025-05-13 06:55:19.323 [WARNING][4860] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" HandleID="k8s-pod-network.6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:55:19.330252 env[1155]: 2025-05-13 06:55:19.324 [INFO][4860] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" HandleID="k8s-pod-network.6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:55:19.330252 env[1155]: 2025-05-13 06:55:19.327 [INFO][4860] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:19.330252 env[1155]: 2025-05-13 06:55:19.329 [INFO][4834] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" May 13 06:55:19.330252 env[1155]: time="2025-05-13T06:55:19.330240992Z" level=info msg="TearDown network for sandbox \"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\" successfully" May 13 06:55:19.330892 env[1155]: time="2025-05-13T06:55:19.330272237Z" level=info msg="StopPodSandbox for \"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\" returns successfully" May 13 06:55:19.363993 env[1155]: 2025-05-13 06:55:19.300 [WARNING][4853] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0", GenerateName:"calico-apiserver-579977495-", Namespace:"calico-apiserver", SelfLink:"", UID:"7dd504f7-f59c-4f56-83ca-cfbb5256e7fc", ResourceVersion:"936", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"579977495", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362", Pod:"calico-apiserver-579977495-4vp7r", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.20.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif9d730fd425", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:19.363993 env[1155]: 2025-05-13 06:55:19.301 [INFO][4853] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" May 13 06:55:19.363993 env[1155]: 2025-05-13 06:55:19.301 [INFO][4853] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" iface="eth0" netns="" May 13 06:55:19.363993 env[1155]: 2025-05-13 06:55:19.301 [INFO][4853] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" May 13 06:55:19.363993 env[1155]: 2025-05-13 06:55:19.301 [INFO][4853] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" May 13 06:55:19.363993 env[1155]: 2025-05-13 06:55:19.340 [INFO][4867] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" HandleID="k8s-pod-network.9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:55:19.363993 env[1155]: 2025-05-13 06:55:19.340 [INFO][4867] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:19.363993 env[1155]: 2025-05-13 06:55:19.340 [INFO][4867] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:19.363993 env[1155]: 2025-05-13 06:55:19.356 [WARNING][4867] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" HandleID="k8s-pod-network.9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:55:19.363993 env[1155]: 2025-05-13 06:55:19.356 [INFO][4867] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" HandleID="k8s-pod-network.9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:55:19.363993 env[1155]: 2025-05-13 06:55:19.361 [INFO][4867] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:19.363993 env[1155]: 2025-05-13 06:55:19.362 [INFO][4853] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" May 13 06:55:19.364626 env[1155]: time="2025-05-13T06:55:19.363993597Z" level=info msg="TearDown network for sandbox \"9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f\" successfully" May 13 06:55:19.364626 env[1155]: time="2025-05-13T06:55:19.364034518Z" level=info msg="StopPodSandbox for \"9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f\" returns successfully" May 13 06:55:19.364626 env[1155]: time="2025-05-13T06:55:19.364508256Z" level=info msg="RemovePodSandbox for \"9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f\"" May 13 06:55:19.364626 env[1155]: time="2025-05-13T06:55:19.364535763Z" level=info msg="Forcibly stopping sandbox \"9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f\"" May 13 06:55:19.371850 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb-rootfs.mount: Deactivated successfully. May 13 06:55:19.371963 systemd[1]: run-netns-cni\x2d4c1528a9\x2d5297\x2dd559\x2d66cb\x2d54904bcb0c87.mount: Deactivated successfully. May 13 06:55:19.372022 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb-shm.mount: Deactivated successfully. May 13 06:55:19.383000 audit[4885]: NETFILTER_CFG table=filter:128 family=2 entries=8 op=nft_register_rule pid=4885 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:19.383000 audit[4885]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffee739dc60 a2=0 a3=7ffee739dc4c items=0 ppid=2110 pid=4885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:19.383000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:19.387000 audit[4885]: NETFILTER_CFG table=nat:129 family=2 entries=30 op=nft_register_rule pid=4885 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:19.387000 audit[4885]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffee739dc60 a2=0 a3=7ffee739dc4c items=0 ppid=2110 pid=4885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:19.387000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:19.444453 kubelet[1935]: I0513 06:55:19.444414 1935 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-xtv2k\" (UniqueName: \"kubernetes.io/projected/e4a0e09c-41bf-47f7-91e8-38610cbd0d23-kube-api-access-xtv2k\") pod \"e4a0e09c-41bf-47f7-91e8-38610cbd0d23\" (UID: \"e4a0e09c-41bf-47f7-91e8-38610cbd0d23\") " May 13 06:55:19.444613 kubelet[1935]: I0513 06:55:19.444472 1935 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e4a0e09c-41bf-47f7-91e8-38610cbd0d23-calico-apiserver-certs\") pod \"e4a0e09c-41bf-47f7-91e8-38610cbd0d23\" (UID: \"e4a0e09c-41bf-47f7-91e8-38610cbd0d23\") " May 13 06:55:19.452857 systemd[1]: var-lib-kubelet-pods-e4a0e09c\x2d41bf\x2d47f7\x2d91e8\x2d38610cbd0d23-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. May 13 06:55:19.454512 kubelet[1935]: I0513 06:55:19.454477 1935 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/e4a0e09c-41bf-47f7-91e8-38610cbd0d23-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "e4a0e09c-41bf-47f7-91e8-38610cbd0d23" (UID: "e4a0e09c-41bf-47f7-91e8-38610cbd0d23"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 13 06:55:19.458117 systemd[1]: var-lib-kubelet-pods-e4a0e09c\x2d41bf\x2d47f7\x2d91e8\x2d38610cbd0d23-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dxtv2k.mount: Deactivated successfully. May 13 06:55:19.459843 kubelet[1935]: I0513 06:55:19.459809 1935 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/e4a0e09c-41bf-47f7-91e8-38610cbd0d23-kube-api-access-xtv2k" (OuterVolumeSpecName: "kube-api-access-xtv2k") pod "e4a0e09c-41bf-47f7-91e8-38610cbd0d23" (UID: "e4a0e09c-41bf-47f7-91e8-38610cbd0d23"). InnerVolumeSpecName "kube-api-access-xtv2k". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 13 06:55:19.464528 env[1155]: 2025-05-13 06:55:19.417 [WARNING][4889] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0", GenerateName:"calico-apiserver-579977495-", Namespace:"calico-apiserver", SelfLink:"", UID:"7dd504f7-f59c-4f56-83ca-cfbb5256e7fc", ResourceVersion:"936", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"579977495", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362", Pod:"calico-apiserver-579977495-4vp7r", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.20.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif9d730fd425", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:19.464528 env[1155]: 2025-05-13 06:55:19.418 [INFO][4889] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" May 13 06:55:19.464528 env[1155]: 2025-05-13 06:55:19.418 [INFO][4889] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" iface="eth0" netns="" May 13 06:55:19.464528 env[1155]: 2025-05-13 06:55:19.418 [INFO][4889] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" May 13 06:55:19.464528 env[1155]: 2025-05-13 06:55:19.418 [INFO][4889] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" May 13 06:55:19.464528 env[1155]: 2025-05-13 06:55:19.438 [INFO][4896] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" HandleID="k8s-pod-network.9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:55:19.464528 env[1155]: 2025-05-13 06:55:19.438 [INFO][4896] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:19.464528 env[1155]: 2025-05-13 06:55:19.438 [INFO][4896] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:19.464528 env[1155]: 2025-05-13 06:55:19.460 [WARNING][4896] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" HandleID="k8s-pod-network.9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:55:19.464528 env[1155]: 2025-05-13 06:55:19.460 [INFO][4896] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" HandleID="k8s-pod-network.9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:55:19.464528 env[1155]: 2025-05-13 06:55:19.462 [INFO][4896] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:19.464528 env[1155]: 2025-05-13 06:55:19.463 [INFO][4889] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f" May 13 06:55:19.464959 env[1155]: time="2025-05-13T06:55:19.464546041Z" level=info msg="TearDown network for sandbox \"9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f\" successfully" May 13 06:55:19.468556 env[1155]: time="2025-05-13T06:55:19.468528795Z" level=info msg="RemovePodSandbox \"9f9f8fe194205763e78484e8e1ff25d701ef335ae28668f7fc9cfa355a1c352f\" returns successfully" May 13 06:55:19.468980 env[1155]: time="2025-05-13T06:55:19.468956602Z" level=info msg="StopPodSandbox for \"58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515\"" May 13 06:55:19.546081 kubelet[1935]: I0513 06:55:19.545704 1935 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-xtv2k\" (UniqueName: \"kubernetes.io/projected/e4a0e09c-41bf-47f7-91e8-38610cbd0d23-kube-api-access-xtv2k\") on node \"ci-3510-3-7-n-7f05b50207.novalocal\" DevicePath \"\"" May 13 06:55:19.546081 kubelet[1935]: I0513 06:55:19.545740 1935 reconciler_common.go:299] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e4a0e09c-41bf-47f7-91e8-38610cbd0d23-calico-apiserver-certs\") on node \"ci-3510-3-7-n-7f05b50207.novalocal\" DevicePath \"\"" May 13 06:55:19.549212 env[1155]: 2025-05-13 06:55:19.513 [WARNING][4917] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"e974b640-4ca2-42b9-a109-947d123327d0", ResourceVersion:"852", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67", Pod:"coredns-668d6bf9bc-777cz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.20.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali04e15ee1982", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:19.549212 env[1155]: 2025-05-13 06:55:19.514 [INFO][4917] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" May 13 06:55:19.549212 env[1155]: 2025-05-13 06:55:19.514 [INFO][4917] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" iface="eth0" netns="" May 13 06:55:19.549212 env[1155]: 2025-05-13 06:55:19.514 [INFO][4917] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" May 13 06:55:19.549212 env[1155]: 2025-05-13 06:55:19.514 [INFO][4917] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" May 13 06:55:19.549212 env[1155]: 2025-05-13 06:55:19.537 [INFO][4924] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" HandleID="k8s-pod-network.58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-eth0" May 13 06:55:19.549212 env[1155]: 2025-05-13 06:55:19.537 [INFO][4924] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:19.549212 env[1155]: 2025-05-13 06:55:19.537 [INFO][4924] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:19.549212 env[1155]: 2025-05-13 06:55:19.545 [WARNING][4924] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" HandleID="k8s-pod-network.58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-eth0" May 13 06:55:19.549212 env[1155]: 2025-05-13 06:55:19.545 [INFO][4924] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" HandleID="k8s-pod-network.58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-eth0" May 13 06:55:19.549212 env[1155]: 2025-05-13 06:55:19.547 [INFO][4924] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:19.549212 env[1155]: 2025-05-13 06:55:19.548 [INFO][4917] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" May 13 06:55:19.549765 env[1155]: time="2025-05-13T06:55:19.549243830Z" level=info msg="TearDown network for sandbox \"58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515\" successfully" May 13 06:55:19.549765 env[1155]: time="2025-05-13T06:55:19.549272670Z" level=info msg="StopPodSandbox for \"58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515\" returns successfully" May 13 06:55:19.549765 env[1155]: time="2025-05-13T06:55:19.549632058Z" level=info msg="RemovePodSandbox for \"58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515\"" May 13 06:55:19.549765 env[1155]: time="2025-05-13T06:55:19.549658694Z" level=info msg="Forcibly stopping sandbox \"58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515\"" May 13 06:55:19.629964 env[1155]: 2025-05-13 06:55:19.594 [WARNING][4942] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"e974b640-4ca2-42b9-a109-947d123327d0", ResourceVersion:"852", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"b5ac9fcd655cdfabf0695c00dc63c39793aadd52ac2ba4c2d885bdb577d00f67", Pod:"coredns-668d6bf9bc-777cz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.20.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali04e15ee1982", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:19.629964 env[1155]: 2025-05-13 06:55:19.595 [INFO][4942] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" May 13 06:55:19.629964 env[1155]: 2025-05-13 06:55:19.595 [INFO][4942] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" iface="eth0" netns="" May 13 06:55:19.629964 env[1155]: 2025-05-13 06:55:19.595 [INFO][4942] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" May 13 06:55:19.629964 env[1155]: 2025-05-13 06:55:19.595 [INFO][4942] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" May 13 06:55:19.629964 env[1155]: 2025-05-13 06:55:19.616 [INFO][4949] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" HandleID="k8s-pod-network.58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-eth0" May 13 06:55:19.629964 env[1155]: 2025-05-13 06:55:19.616 [INFO][4949] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:19.629964 env[1155]: 2025-05-13 06:55:19.616 [INFO][4949] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:19.629964 env[1155]: 2025-05-13 06:55:19.625 [WARNING][4949] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" HandleID="k8s-pod-network.58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-eth0" May 13 06:55:19.629964 env[1155]: 2025-05-13 06:55:19.626 [INFO][4949] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" HandleID="k8s-pod-network.58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-coredns--668d6bf9bc--777cz-eth0" May 13 06:55:19.629964 env[1155]: 2025-05-13 06:55:19.627 [INFO][4949] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:19.629964 env[1155]: 2025-05-13 06:55:19.628 [INFO][4942] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515" May 13 06:55:19.630506 env[1155]: time="2025-05-13T06:55:19.630006619Z" level=info msg="TearDown network for sandbox \"58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515\" successfully" May 13 06:55:19.634114 env[1155]: time="2025-05-13T06:55:19.634078028Z" level=info msg="RemovePodSandbox \"58fe13b6e411206e2b3da3c5433691bc5ee153054f2b07d1181f069ae0e19515\" returns successfully" May 13 06:55:19.634505 env[1155]: time="2025-05-13T06:55:19.634472187Z" level=info msg="StopPodSandbox for \"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\"" May 13 06:55:19.712027 env[1155]: 2025-05-13 06:55:19.673 [WARNING][4968] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0", GenerateName:"calico-apiserver-579977495-", Namespace:"calico-apiserver", SelfLink:"", UID:"e4a0e09c-41bf-47f7-91e8-38610cbd0d23", ResourceVersion:"970", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"579977495", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb", Pod:"calico-apiserver-579977495-p7jjc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali01b582543c9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:19.712027 env[1155]: 2025-05-13 06:55:19.673 [INFO][4968] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" May 13 06:55:19.712027 env[1155]: 2025-05-13 06:55:19.673 [INFO][4968] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" iface="eth0" netns="" May 13 06:55:19.712027 env[1155]: 2025-05-13 06:55:19.673 [INFO][4968] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" May 13 06:55:19.712027 env[1155]: 2025-05-13 06:55:19.673 [INFO][4968] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" May 13 06:55:19.712027 env[1155]: 2025-05-13 06:55:19.696 [INFO][4977] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" HandleID="k8s-pod-network.6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:55:19.712027 env[1155]: 2025-05-13 06:55:19.697 [INFO][4977] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:19.712027 env[1155]: 2025-05-13 06:55:19.697 [INFO][4977] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:19.712027 env[1155]: 2025-05-13 06:55:19.706 [WARNING][4977] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" HandleID="k8s-pod-network.6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:55:19.712027 env[1155]: 2025-05-13 06:55:19.707 [INFO][4977] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" HandleID="k8s-pod-network.6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:55:19.712027 env[1155]: 2025-05-13 06:55:19.709 [INFO][4977] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:19.712027 env[1155]: 2025-05-13 06:55:19.710 [INFO][4968] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" May 13 06:55:19.712562 env[1155]: time="2025-05-13T06:55:19.712531826Z" level=info msg="TearDown network for sandbox \"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\" successfully" May 13 06:55:19.712636 env[1155]: time="2025-05-13T06:55:19.712616433Z" level=info msg="StopPodSandbox for \"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\" returns successfully" May 13 06:55:19.713225 env[1155]: time="2025-05-13T06:55:19.713185857Z" level=info msg="RemovePodSandbox for \"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\"" May 13 06:55:19.713284 env[1155]: time="2025-05-13T06:55:19.713233400Z" level=info msg="Forcibly stopping sandbox \"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\"" May 13 06:55:19.794664 kubelet[1935]: I0513 06:55:19.792215 1935 scope.go:117] "RemoveContainer" containerID="2f3eeaa27258db04780e18b86c137a0a75a9c4025f4922bbbb4f9acbabdc2282" May 13 06:55:19.796661 systemd[1]: Removed slice kubepods-besteffort-pode4a0e09c_41bf_47f7_91e8_38610cbd0d23.slice. May 13 06:55:19.801484 env[1155]: time="2025-05-13T06:55:19.801444094Z" level=info msg="RemoveContainer for \"2f3eeaa27258db04780e18b86c137a0a75a9c4025f4922bbbb4f9acbabdc2282\"" May 13 06:55:19.806258 env[1155]: 2025-05-13 06:55:19.757 [WARNING][4995] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0", GenerateName:"calico-apiserver-579977495-", Namespace:"calico-apiserver", SelfLink:"", UID:"e4a0e09c-41bf-47f7-91e8-38610cbd0d23", ResourceVersion:"970", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 54, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"579977495", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb", Pod:"calico-apiserver-579977495-p7jjc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali01b582543c9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:19.806258 env[1155]: 2025-05-13 06:55:19.758 [INFO][4995] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" May 13 06:55:19.806258 env[1155]: 2025-05-13 06:55:19.758 [INFO][4995] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" iface="eth0" netns="" May 13 06:55:19.806258 env[1155]: 2025-05-13 06:55:19.758 [INFO][4995] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" May 13 06:55:19.806258 env[1155]: 2025-05-13 06:55:19.758 [INFO][4995] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" May 13 06:55:19.806258 env[1155]: 2025-05-13 06:55:19.778 [INFO][5002] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" HandleID="k8s-pod-network.6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:55:19.806258 env[1155]: 2025-05-13 06:55:19.778 [INFO][5002] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:19.806258 env[1155]: 2025-05-13 06:55:19.778 [INFO][5002] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:19.806258 env[1155]: 2025-05-13 06:55:19.791 [WARNING][5002] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" HandleID="k8s-pod-network.6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:55:19.806258 env[1155]: 2025-05-13 06:55:19.791 [INFO][5002] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" HandleID="k8s-pod-network.6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:55:19.806258 env[1155]: 2025-05-13 06:55:19.803 [INFO][5002] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:19.806258 env[1155]: 2025-05-13 06:55:19.804 [INFO][4995] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750" May 13 06:55:19.806778 env[1155]: time="2025-05-13T06:55:19.806748155Z" level=info msg="TearDown network for sandbox \"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\" successfully" May 13 06:55:19.811529 env[1155]: time="2025-05-13T06:55:19.811465022Z" level=info msg="RemoveContainer for \"2f3eeaa27258db04780e18b86c137a0a75a9c4025f4922bbbb4f9acbabdc2282\" returns successfully" May 13 06:55:19.811814 kubelet[1935]: I0513 06:55:19.811785 1935 scope.go:117] "RemoveContainer" containerID="2f3eeaa27258db04780e18b86c137a0a75a9c4025f4922bbbb4f9acbabdc2282" May 13 06:55:19.812136 env[1155]: time="2025-05-13T06:55:19.812024999Z" level=error msg="ContainerStatus for \"2f3eeaa27258db04780e18b86c137a0a75a9c4025f4922bbbb4f9acbabdc2282\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"2f3eeaa27258db04780e18b86c137a0a75a9c4025f4922bbbb4f9acbabdc2282\": not found" May 13 06:55:19.812324 kubelet[1935]: E0513 06:55:19.812250 1935 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"2f3eeaa27258db04780e18b86c137a0a75a9c4025f4922bbbb4f9acbabdc2282\": not found" containerID="2f3eeaa27258db04780e18b86c137a0a75a9c4025f4922bbbb4f9acbabdc2282" May 13 06:55:19.812324 kubelet[1935]: I0513 06:55:19.812281 1935 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"2f3eeaa27258db04780e18b86c137a0a75a9c4025f4922bbbb4f9acbabdc2282"} err="failed to get container status \"2f3eeaa27258db04780e18b86c137a0a75a9c4025f4922bbbb4f9acbabdc2282\": rpc error: code = NotFound desc = an error occurred when try to find container \"2f3eeaa27258db04780e18b86c137a0a75a9c4025f4922bbbb4f9acbabdc2282\": not found" May 13 06:55:19.816444 env[1155]: time="2025-05-13T06:55:19.816400930Z" level=info msg="RemovePodSandbox \"6dc9a5ef170b848c9b602def719eff065e1a183c305d2a4a0eb1efee590f2750\" returns successfully" May 13 06:55:20.213010 kubelet[1935]: I0513 06:55:20.212885 1935 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="e4a0e09c-41bf-47f7-91e8-38610cbd0d23" path="/var/lib/kubelet/pods/e4a0e09c-41bf-47f7-91e8-38610cbd0d23/volumes" May 13 06:55:23.659000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:55:23.663817 kernel: kauditd_printk_skb: 126 callbacks suppressed May 13 06:55:23.663980 kernel: audit: type=1400 audit(1747119323.659:1374): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:55:23.676986 kernel: audit: type=1300 audit(1747119323.659:1374): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001402780 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:55:23.659000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001402780 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:55:23.659000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:55:23.709081 kernel: audit: type=1327 audit(1747119323.659:1374): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:55:23.709216 kernel: audit: type=1400 audit(1747119323.661:1375): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:55:23.661000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:55:23.661000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001fd1b20 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:55:23.746955 kernel: audit: type=1300 audit(1747119323.661:1375): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001fd1b20 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:55:23.661000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:55:23.753981 kernel: audit: type=1327 audit(1747119323.661:1375): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:55:23.661000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:55:23.661000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001fd1b40 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:55:23.767692 kernel: audit: type=1400 audit(1747119323.661:1376): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:55:23.767805 kernel: audit: type=1300 audit(1747119323.661:1376): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001fd1b40 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:55:23.768025 kernel: audit: type=1327 audit(1747119323.661:1376): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:55:23.661000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:55:23.666000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:55:23.780488 kernel: audit: type=1400 audit(1747119323.666:1377): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:55:23.666000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001fd1d00 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:55:23.666000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:55:32.474673 systemd[1]: run-containerd-runc-k8s.io-7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a-runc.cKBaeb.mount: Deactivated successfully. May 13 06:55:32.529397 env[1155]: time="2025-05-13T06:55:32.529358425Z" level=info msg="StopContainer for \"0cd8c6ed746f64e76e3966929c35a2da375256f0dba343c0e4dd04894bae932e\" with timeout 300 (s)" May 13 06:55:32.530185 env[1155]: time="2025-05-13T06:55:32.530162981Z" level=info msg="Stop container \"0cd8c6ed746f64e76e3966929c35a2da375256f0dba343c0e4dd04894bae932e\" with signal terminated" May 13 06:55:32.575000 audit[5052]: NETFILTER_CFG table=filter:130 family=2 entries=8 op=nft_register_rule pid=5052 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:32.578496 kernel: kauditd_printk_skb: 2 callbacks suppressed May 13 06:55:32.578557 kernel: audit: type=1325 audit(1747119332.575:1378): table=filter:130 family=2 entries=8 op=nft_register_rule pid=5052 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:32.575000 audit[5052]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd102de5f0 a2=0 a3=7ffd102de5dc items=0 ppid=2110 pid=5052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:32.590149 kernel: audit: type=1300 audit(1747119332.575:1378): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd102de5f0 a2=0 a3=7ffd102de5dc items=0 ppid=2110 pid=5052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:32.575000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:32.599004 kernel: audit: type=1327 audit(1747119332.575:1378): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:32.599000 audit[5052]: NETFILTER_CFG table=nat:131 family=2 entries=30 op=nft_register_rule pid=5052 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:32.599000 audit[5052]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd102de5f0 a2=0 a3=7ffd102de5dc items=0 ppid=2110 pid=5052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:32.612673 kernel: audit: type=1325 audit(1747119332.599:1379): table=nat:131 family=2 entries=30 op=nft_register_rule pid=5052 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:32.612805 kernel: audit: type=1300 audit(1747119332.599:1379): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd102de5f0 a2=0 a3=7ffd102de5dc items=0 ppid=2110 pid=5052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:32.599000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:32.626946 kernel: audit: type=1327 audit(1747119332.599:1379): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:32.641993 systemd[1]: run-containerd-runc-k8s.io-7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a-runc.9qAAoO.mount: Deactivated successfully. May 13 06:55:32.795528 env[1155]: time="2025-05-13T06:55:32.795097050Z" level=info msg="StopContainer for \"65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937\" with timeout 30 (s)" May 13 06:55:32.796186 env[1155]: time="2025-05-13T06:55:32.796164756Z" level=info msg="Stop container \"65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937\" with signal terminated" May 13 06:55:32.851528 env[1155]: time="2025-05-13T06:55:32.851474977Z" level=error msg="ExecSync for \"65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937\" failed" error="failed to exec in container: failed to start exec \"846363a7ce2a8d3d5428c570f3f199a6c5018dabcec9e12577f74eb13e3b91bb\": OCI runtime exec failed: exec failed: cannot exec in a stopped container: unknown" May 13 06:55:32.853941 kubelet[1935]: E0513 06:55:32.852098 1935 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = failed to exec in container: failed to start exec \"846363a7ce2a8d3d5428c570f3f199a6c5018dabcec9e12577f74eb13e3b91bb\": OCI runtime exec failed: exec failed: cannot exec in a stopped container: unknown" containerID="65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937" cmd=["/usr/bin/check-status","-l"] May 13 06:55:32.865896 env[1155]: time="2025-05-13T06:55:32.865844067Z" level=error msg="ExecSync for \"65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937\" failed" error="failed to exec in container: failed to start exec \"419768ff515b146b10f49ee059a917daf52299412a290c5dab358a6e58ecb30b\": OCI runtime exec failed: exec failed: cannot exec in a stopped container: unknown" May 13 06:55:32.866093 kubelet[1935]: E0513 06:55:32.866043 1935 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = failed to exec in container: failed to start exec \"419768ff515b146b10f49ee059a917daf52299412a290c5dab358a6e58ecb30b\": OCI runtime exec failed: exec failed: cannot exec in a stopped container: unknown" containerID="65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937" cmd=["/usr/bin/check-status","-l"] May 13 06:55:32.882248 env[1155]: time="2025-05-13T06:55:32.882190806Z" level=error msg="ExecSync for \"65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937\" failed" error="failed to exec in container: failed to start exec \"0a8583632116fcc8e02b4432780864d88fe1f4320ce9a580e83b729d5fb36bb3\": OCI runtime exec failed: exec failed: cannot exec in a stopped container: unknown" May 13 06:55:32.882410 kubelet[1935]: E0513 06:55:32.882365 1935 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = failed to exec in container: failed to start exec \"0a8583632116fcc8e02b4432780864d88fe1f4320ce9a580e83b729d5fb36bb3\": OCI runtime exec failed: exec failed: cannot exec in a stopped container: unknown" containerID="65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937" cmd=["/usr/bin/check-status","-l"] May 13 06:55:32.908473 systemd[1]: cri-containerd-65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937.scope: Deactivated successfully. May 13 06:55:32.907000 audit: BPF prog-id=216 op=UNLOAD May 13 06:55:32.910944 kernel: audit: type=1334 audit(1747119332.907:1380): prog-id=216 op=UNLOAD May 13 06:55:32.928000 audit: BPF prog-id=219 op=UNLOAD May 13 06:55:32.931958 kernel: audit: type=1334 audit(1747119332.928:1381): prog-id=219 op=UNLOAD May 13 06:55:32.947716 env[1155]: time="2025-05-13T06:55:32.947663939Z" level=info msg="shim disconnected" id=65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937 May 13 06:55:32.947971 env[1155]: time="2025-05-13T06:55:32.947741217Z" level=warning msg="cleaning up after shim disconnected" id=65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937 namespace=k8s.io May 13 06:55:32.947971 env[1155]: time="2025-05-13T06:55:32.947753449Z" level=info msg="cleaning up dead shim" May 13 06:55:32.958423 env[1155]: time="2025-05-13T06:55:32.958374998Z" level=warning msg="cleanup warnings time=\"2025-05-13T06:55:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5129 runtime=io.containerd.runc.v2\n" May 13 06:55:32.962624 env[1155]: time="2025-05-13T06:55:32.962581077Z" level=info msg="StopContainer for \"65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937\" returns successfully" May 13 06:55:32.963054 env[1155]: time="2025-05-13T06:55:32.963027603Z" level=info msg="StopPodSandbox for \"9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279\"" May 13 06:55:32.963108 env[1155]: time="2025-05-13T06:55:32.963093501Z" level=info msg="Container to stop \"65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 13 06:55:32.968392 env[1155]: time="2025-05-13T06:55:32.968346968Z" level=info msg="StopContainer for \"7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a\" with timeout 5 (s)" May 13 06:55:32.968610 env[1155]: time="2025-05-13T06:55:32.968584814Z" level=info msg="Stop container \"7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a\" with signal terminated" May 13 06:55:32.982172 systemd[1]: cri-containerd-9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279.scope: Deactivated successfully. May 13 06:55:32.981000 audit: BPF prog-id=189 op=UNLOAD May 13 06:55:32.984944 kernel: audit: type=1334 audit(1747119332.981:1382): prog-id=189 op=UNLOAD May 13 06:55:32.985000 audit: BPF prog-id=192 op=UNLOAD May 13 06:55:32.988942 kernel: audit: type=1334 audit(1747119332.985:1383): prog-id=192 op=UNLOAD May 13 06:55:33.007491 systemd[1]: cri-containerd-7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a.scope: Deactivated successfully. May 13 06:55:33.007691 systemd[1]: cri-containerd-7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a.scope: Consumed 2.054s CPU time. May 13 06:55:33.022964 env[1155]: time="2025-05-13T06:55:33.022730879Z" level=info msg="shim disconnected" id=9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279 May 13 06:55:33.022964 env[1155]: time="2025-05-13T06:55:33.022788862Z" level=warning msg="cleaning up after shim disconnected" id=9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279 namespace=k8s.io May 13 06:55:33.022964 env[1155]: time="2025-05-13T06:55:33.022800253Z" level=info msg="cleaning up dead shim" May 13 06:55:33.035638 env[1155]: time="2025-05-13T06:55:33.035594241Z" level=info msg="shim disconnected" id=7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a May 13 06:55:33.035826 env[1155]: time="2025-05-13T06:55:33.035806440Z" level=warning msg="cleaning up after shim disconnected" id=7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a namespace=k8s.io May 13 06:55:33.035944 env[1155]: time="2025-05-13T06:55:33.035927686Z" level=info msg="cleaning up dead shim" May 13 06:55:33.043513 env[1155]: time="2025-05-13T06:55:33.043467794Z" level=warning msg="cleanup warnings time=\"2025-05-13T06:55:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5175 runtime=io.containerd.runc.v2\n" May 13 06:55:33.050494 env[1155]: time="2025-05-13T06:55:33.049522847Z" level=warning msg="cleanup warnings time=\"2025-05-13T06:55:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5192 runtime=io.containerd.runc.v2\n" May 13 06:55:33.060557 env[1155]: time="2025-05-13T06:55:33.060516737Z" level=info msg="StopContainer for \"7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a\" returns successfully" May 13 06:55:33.061320 env[1155]: time="2025-05-13T06:55:33.061297534Z" level=info msg="StopPodSandbox for \"51343e923587e69c5873f41cfd42af9a536d33902f9ba35828ea33ee017b0eeb\"" May 13 06:55:33.061551 env[1155]: time="2025-05-13T06:55:33.061530780Z" level=info msg="Container to stop \"c7b275d6227021ef9c80e8b928b04624acdc8c5356dd68acb59ad6ec9d351e46\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 13 06:55:33.061656 env[1155]: time="2025-05-13T06:55:33.061636089Z" level=info msg="Container to stop \"921dbd493b4245522cff89fd2c80700b3e276f6c78752a6b911bf3921eaf41ea\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 13 06:55:33.061760 env[1155]: time="2025-05-13T06:55:33.061740135Z" level=info msg="Container to stop \"7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 13 06:55:33.072000 audit: BPF prog-id=122 op=UNLOAD May 13 06:55:33.074289 systemd[1]: cri-containerd-51343e923587e69c5873f41cfd42af9a536d33902f9ba35828ea33ee017b0eeb.scope: Deactivated successfully. May 13 06:55:33.078000 audit: BPF prog-id=125 op=UNLOAD May 13 06:55:33.113555 env[1155]: time="2025-05-13T06:55:33.113511011Z" level=info msg="shim disconnected" id=51343e923587e69c5873f41cfd42af9a536d33902f9ba35828ea33ee017b0eeb May 13 06:55:33.113752 env[1155]: time="2025-05-13T06:55:33.113731405Z" level=warning msg="cleaning up after shim disconnected" id=51343e923587e69c5873f41cfd42af9a536d33902f9ba35828ea33ee017b0eeb namespace=k8s.io May 13 06:55:33.113847 env[1155]: time="2025-05-13T06:55:33.113831273Z" level=info msg="cleaning up dead shim" May 13 06:55:33.126732 env[1155]: time="2025-05-13T06:55:33.126682514Z" level=warning msg="cleanup warnings time=\"2025-05-13T06:55:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5246 runtime=io.containerd.runc.v2\n" May 13 06:55:33.133789 env[1155]: time="2025-05-13T06:55:33.133751760Z" level=info msg="TearDown network for sandbox \"51343e923587e69c5873f41cfd42af9a536d33902f9ba35828ea33ee017b0eeb\" successfully" May 13 06:55:33.134026 env[1155]: time="2025-05-13T06:55:33.134005053Z" level=info msg="StopPodSandbox for \"51343e923587e69c5873f41cfd42af9a536d33902f9ba35828ea33ee017b0eeb\" returns successfully" May 13 06:55:33.141204 systemd-networkd[971]: cali3ab6b54ab96: Link DOWN May 13 06:55:33.141212 systemd-networkd[971]: cali3ab6b54ab96: Lost carrier May 13 06:55:33.215537 kubelet[1935]: I0513 06:55:33.214735 1935 memory_manager.go:355] "RemoveStaleState removing state" podUID="e4a0e09c-41bf-47f7-91e8-38610cbd0d23" containerName="calico-apiserver" May 13 06:55:33.215537 kubelet[1935]: I0513 06:55:33.214765 1935 memory_manager.go:355] "RemoveStaleState removing state" podUID="c92e971b-9e06-4663-88bb-6baef3cbe71a" containerName="calico-node" May 13 06:55:33.221539 systemd[1]: Created slice kubepods-besteffort-podd33f01d1_0475_476f_95fd_0e1e60baa90e.slice. May 13 06:55:33.253242 kubelet[1935]: I0513 06:55:33.253206 1935 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-policysync\") pod \"c92e971b-9e06-4663-88bb-6baef3cbe71a\" (UID: \"c92e971b-9e06-4663-88bb-6baef3cbe71a\") " May 13 06:55:33.253401 kubelet[1935]: I0513 06:55:33.253272 1935 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-var-run-calico\") pod \"c92e971b-9e06-4663-88bb-6baef3cbe71a\" (UID: \"c92e971b-9e06-4663-88bb-6baef3cbe71a\") " May 13 06:55:33.253401 kubelet[1935]: I0513 06:55:33.253302 1935 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-cni-net-dir\") pod \"c92e971b-9e06-4663-88bb-6baef3cbe71a\" (UID: \"c92e971b-9e06-4663-88bb-6baef3cbe71a\") " May 13 06:55:33.253401 kubelet[1935]: I0513 06:55:33.253346 1935 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/c92e971b-9e06-4663-88bb-6baef3cbe71a-node-certs\") pod \"c92e971b-9e06-4663-88bb-6baef3cbe71a\" (UID: \"c92e971b-9e06-4663-88bb-6baef3cbe71a\") " May 13 06:55:33.253401 kubelet[1935]: I0513 06:55:33.253366 1935 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-lib-modules\") pod \"c92e971b-9e06-4663-88bb-6baef3cbe71a\" (UID: \"c92e971b-9e06-4663-88bb-6baef3cbe71a\") " May 13 06:55:33.253401 kubelet[1935]: I0513 06:55:33.253391 1935 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-q5d5l\" (UniqueName: \"kubernetes.io/projected/c92e971b-9e06-4663-88bb-6baef3cbe71a-kube-api-access-q5d5l\") pod \"c92e971b-9e06-4663-88bb-6baef3cbe71a\" (UID: \"c92e971b-9e06-4663-88bb-6baef3cbe71a\") " May 13 06:55:33.253559 kubelet[1935]: I0513 06:55:33.253429 1935 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c92e971b-9e06-4663-88bb-6baef3cbe71a-tigera-ca-bundle\") pod \"c92e971b-9e06-4663-88bb-6baef3cbe71a\" (UID: \"c92e971b-9e06-4663-88bb-6baef3cbe71a\") " May 13 06:55:33.253559 kubelet[1935]: I0513 06:55:33.253450 1935 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-cni-bin-dir\") pod \"c92e971b-9e06-4663-88bb-6baef3cbe71a\" (UID: \"c92e971b-9e06-4663-88bb-6baef3cbe71a\") " May 13 06:55:33.253559 kubelet[1935]: I0513 06:55:33.253469 1935 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-var-lib-calico\") pod \"c92e971b-9e06-4663-88bb-6baef3cbe71a\" (UID: \"c92e971b-9e06-4663-88bb-6baef3cbe71a\") " May 13 06:55:33.253559 kubelet[1935]: I0513 06:55:33.253486 1935 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-flexvol-driver-host\") pod \"c92e971b-9e06-4663-88bb-6baef3cbe71a\" (UID: \"c92e971b-9e06-4663-88bb-6baef3cbe71a\") " May 13 06:55:33.253559 kubelet[1935]: I0513 06:55:33.253524 1935 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-cni-log-dir\") pod \"c92e971b-9e06-4663-88bb-6baef3cbe71a\" (UID: \"c92e971b-9e06-4663-88bb-6baef3cbe71a\") " May 13 06:55:33.253559 kubelet[1935]: I0513 06:55:33.253542 1935 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-xtables-lock\") pod \"c92e971b-9e06-4663-88bb-6baef3cbe71a\" (UID: \"c92e971b-9e06-4663-88bb-6baef3cbe71a\") " May 13 06:55:33.253762 kubelet[1935]: I0513 06:55:33.253628 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/d33f01d1-0475-476f-95fd-0e1e60baa90e-policysync\") pod \"calico-node-mjm6h\" (UID: \"d33f01d1-0475-476f-95fd-0e1e60baa90e\") " pod="calico-system/calico-node-mjm6h" May 13 06:55:33.253762 kubelet[1935]: I0513 06:55:33.253655 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/d33f01d1-0475-476f-95fd-0e1e60baa90e-cni-bin-dir\") pod \"calico-node-mjm6h\" (UID: \"d33f01d1-0475-476f-95fd-0e1e60baa90e\") " pod="calico-system/calico-node-mjm6h" May 13 06:55:33.253762 kubelet[1935]: I0513 06:55:33.253707 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d33f01d1-0475-476f-95fd-0e1e60baa90e-var-lib-calico\") pod \"calico-node-mjm6h\" (UID: \"d33f01d1-0475-476f-95fd-0e1e60baa90e\") " pod="calico-system/calico-node-mjm6h" May 13 06:55:33.253762 kubelet[1935]: I0513 06:55:33.253728 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/d33f01d1-0475-476f-95fd-0e1e60baa90e-node-certs\") pod \"calico-node-mjm6h\" (UID: \"d33f01d1-0475-476f-95fd-0e1e60baa90e\") " pod="calico-system/calico-node-mjm6h" May 13 06:55:33.253883 kubelet[1935]: I0513 06:55:33.253763 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/d33f01d1-0475-476f-95fd-0e1e60baa90e-var-run-calico\") pod \"calico-node-mjm6h\" (UID: \"d33f01d1-0475-476f-95fd-0e1e60baa90e\") " pod="calico-system/calico-node-mjm6h" May 13 06:55:33.253883 kubelet[1935]: I0513 06:55:33.253795 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/d33f01d1-0475-476f-95fd-0e1e60baa90e-cni-log-dir\") pod \"calico-node-mjm6h\" (UID: \"d33f01d1-0475-476f-95fd-0e1e60baa90e\") " pod="calico-system/calico-node-mjm6h" May 13 06:55:33.253883 kubelet[1935]: I0513 06:55:33.253815 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/d33f01d1-0475-476f-95fd-0e1e60baa90e-flexvol-driver-host\") pod \"calico-node-mjm6h\" (UID: \"d33f01d1-0475-476f-95fd-0e1e60baa90e\") " pod="calico-system/calico-node-mjm6h" May 13 06:55:33.253883 kubelet[1935]: I0513 06:55:33.253856 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d33f01d1-0475-476f-95fd-0e1e60baa90e-tigera-ca-bundle\") pod \"calico-node-mjm6h\" (UID: \"d33f01d1-0475-476f-95fd-0e1e60baa90e\") " pod="calico-system/calico-node-mjm6h" May 13 06:55:33.253883 kubelet[1935]: I0513 06:55:33.253875 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-27lq8\" (UniqueName: \"kubernetes.io/projected/d33f01d1-0475-476f-95fd-0e1e60baa90e-kube-api-access-27lq8\") pod \"calico-node-mjm6h\" (UID: \"d33f01d1-0475-476f-95fd-0e1e60baa90e\") " pod="calico-system/calico-node-mjm6h" May 13 06:55:33.254059 kubelet[1935]: I0513 06:55:33.253895 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/d33f01d1-0475-476f-95fd-0e1e60baa90e-cni-net-dir\") pod \"calico-node-mjm6h\" (UID: \"d33f01d1-0475-476f-95fd-0e1e60baa90e\") " pod="calico-system/calico-node-mjm6h" May 13 06:55:33.254059 kubelet[1935]: I0513 06:55:33.253955 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d33f01d1-0475-476f-95fd-0e1e60baa90e-xtables-lock\") pod \"calico-node-mjm6h\" (UID: \"d33f01d1-0475-476f-95fd-0e1e60baa90e\") " pod="calico-system/calico-node-mjm6h" May 13 06:55:33.254059 kubelet[1935]: I0513 06:55:33.253980 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d33f01d1-0475-476f-95fd-0e1e60baa90e-lib-modules\") pod \"calico-node-mjm6h\" (UID: \"d33f01d1-0475-476f-95fd-0e1e60baa90e\") " pod="calico-system/calico-node-mjm6h" May 13 06:55:33.254150 kubelet[1935]: I0513 06:55:33.254067 1935 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-policysync" (OuterVolumeSpecName: "policysync") pod "c92e971b-9e06-4663-88bb-6baef3cbe71a" (UID: "c92e971b-9e06-4663-88bb-6baef3cbe71a"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 13 06:55:33.254150 kubelet[1935]: I0513 06:55:33.254122 1935 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "c92e971b-9e06-4663-88bb-6baef3cbe71a" (UID: "c92e971b-9e06-4663-88bb-6baef3cbe71a"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 13 06:55:33.254150 kubelet[1935]: I0513 06:55:33.254145 1935 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "c92e971b-9e06-4663-88bb-6baef3cbe71a" (UID: "c92e971b-9e06-4663-88bb-6baef3cbe71a"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 13 06:55:33.255933 kubelet[1935]: I0513 06:55:33.254318 1935 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "c92e971b-9e06-4663-88bb-6baef3cbe71a" (UID: "c92e971b-9e06-4663-88bb-6baef3cbe71a"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 13 06:55:33.255933 kubelet[1935]: I0513 06:55:33.255113 1935 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "c92e971b-9e06-4663-88bb-6baef3cbe71a" (UID: "c92e971b-9e06-4663-88bb-6baef3cbe71a"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 13 06:55:33.255933 kubelet[1935]: I0513 06:55:33.255139 1935 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "c92e971b-9e06-4663-88bb-6baef3cbe71a" (UID: "c92e971b-9e06-4663-88bb-6baef3cbe71a"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 13 06:55:33.255933 kubelet[1935]: I0513 06:55:33.255158 1935 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "c92e971b-9e06-4663-88bb-6baef3cbe71a" (UID: "c92e971b-9e06-4663-88bb-6baef3cbe71a"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 13 06:55:33.255933 kubelet[1935]: I0513 06:55:33.255177 1935 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "c92e971b-9e06-4663-88bb-6baef3cbe71a" (UID: "c92e971b-9e06-4663-88bb-6baef3cbe71a"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 13 06:55:33.256202 kubelet[1935]: I0513 06:55:33.255195 1935 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "c92e971b-9e06-4663-88bb-6baef3cbe71a" (UID: "c92e971b-9e06-4663-88bb-6baef3cbe71a"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 13 06:55:33.258578 kubelet[1935]: I0513 06:55:33.258550 1935 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/c92e971b-9e06-4663-88bb-6baef3cbe71a-node-certs" (OuterVolumeSpecName: "node-certs") pod "c92e971b-9e06-4663-88bb-6baef3cbe71a" (UID: "c92e971b-9e06-4663-88bb-6baef3cbe71a"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 13 06:55:33.258819 kubelet[1935]: I0513 06:55:33.258794 1935 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/c92e971b-9e06-4663-88bb-6baef3cbe71a-kube-api-access-q5d5l" (OuterVolumeSpecName: "kube-api-access-q5d5l") pod "c92e971b-9e06-4663-88bb-6baef3cbe71a" (UID: "c92e971b-9e06-4663-88bb-6baef3cbe71a"). InnerVolumeSpecName "kube-api-access-q5d5l". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 13 06:55:33.262096 kubelet[1935]: I0513 06:55:33.262050 1935 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/c92e971b-9e06-4663-88bb-6baef3cbe71a-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "c92e971b-9e06-4663-88bb-6baef3cbe71a" (UID: "c92e971b-9e06-4663-88bb-6baef3cbe71a"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 13 06:55:33.278514 env[1155]: 2025-05-13 06:55:33.136 [INFO][5222] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" May 13 06:55:33.278514 env[1155]: 2025-05-13 06:55:33.137 [INFO][5222] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" iface="eth0" netns="/var/run/netns/cni-f914553c-0b9e-6b7a-3e31-58bb525f5c37" May 13 06:55:33.278514 env[1155]: 2025-05-13 06:55:33.137 [INFO][5222] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" iface="eth0" netns="/var/run/netns/cni-f914553c-0b9e-6b7a-3e31-58bb525f5c37" May 13 06:55:33.278514 env[1155]: 2025-05-13 06:55:33.162 [INFO][5222] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" after=25.67908ms iface="eth0" netns="/var/run/netns/cni-f914553c-0b9e-6b7a-3e31-58bb525f5c37" May 13 06:55:33.278514 env[1155]: 2025-05-13 06:55:33.162 [INFO][5222] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" May 13 06:55:33.278514 env[1155]: 2025-05-13 06:55:33.162 [INFO][5222] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" May 13 06:55:33.278514 env[1155]: 2025-05-13 06:55:33.198 [INFO][5261] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" HandleID="k8s-pod-network.9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:55:33.278514 env[1155]: 2025-05-13 06:55:33.198 [INFO][5261] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:33.278514 env[1155]: 2025-05-13 06:55:33.198 [INFO][5261] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:33.278514 env[1155]: 2025-05-13 06:55:33.271 [INFO][5261] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" HandleID="k8s-pod-network.9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:55:33.278514 env[1155]: 2025-05-13 06:55:33.271 [INFO][5261] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" HandleID="k8s-pod-network.9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:55:33.278514 env[1155]: 2025-05-13 06:55:33.275 [INFO][5261] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:33.278514 env[1155]: 2025-05-13 06:55:33.276 [INFO][5222] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" May 13 06:55:33.279297 env[1155]: time="2025-05-13T06:55:33.279253443Z" level=info msg="TearDown network for sandbox \"9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279\" successfully" May 13 06:55:33.279395 env[1155]: time="2025-05-13T06:55:33.279374560Z" level=info msg="StopPodSandbox for \"9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279\" returns successfully" May 13 06:55:33.355025 kubelet[1935]: I0513 06:55:33.354941 1935 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9f406868-14be-4f07-a347-37e45f4acb44-tigera-ca-bundle\") pod \"9f406868-14be-4f07-a347-37e45f4acb44\" (UID: \"9f406868-14be-4f07-a347-37e45f4acb44\") " May 13 06:55:33.355218 kubelet[1935]: I0513 06:55:33.355202 1935 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-kvn8v\" (UniqueName: \"kubernetes.io/projected/9f406868-14be-4f07-a347-37e45f4acb44-kube-api-access-kvn8v\") pod \"9f406868-14be-4f07-a347-37e45f4acb44\" (UID: \"9f406868-14be-4f07-a347-37e45f4acb44\") " May 13 06:55:33.355497 kubelet[1935]: I0513 06:55:33.355482 1935 reconciler_common.go:299] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-policysync\") on node \"ci-3510-3-7-n-7f05b50207.novalocal\" DevicePath \"\"" May 13 06:55:33.355584 kubelet[1935]: I0513 06:55:33.355572 1935 reconciler_common.go:299] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/c92e971b-9e06-4663-88bb-6baef3cbe71a-node-certs\") on node \"ci-3510-3-7-n-7f05b50207.novalocal\" DevicePath \"\"" May 13 06:55:33.355693 kubelet[1935]: I0513 06:55:33.355681 1935 reconciler_common.go:299] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-lib-modules\") on node \"ci-3510-3-7-n-7f05b50207.novalocal\" DevicePath \"\"" May 13 06:55:33.355782 kubelet[1935]: I0513 06:55:33.355771 1935 reconciler_common.go:299] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c92e971b-9e06-4663-88bb-6baef3cbe71a-tigera-ca-bundle\") on node \"ci-3510-3-7-n-7f05b50207.novalocal\" DevicePath \"\"" May 13 06:55:33.355909 kubelet[1935]: I0513 06:55:33.355897 1935 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-q5d5l\" (UniqueName: \"kubernetes.io/projected/c92e971b-9e06-4663-88bb-6baef3cbe71a-kube-api-access-q5d5l\") on node \"ci-3510-3-7-n-7f05b50207.novalocal\" DevicePath \"\"" May 13 06:55:33.357670 kubelet[1935]: I0513 06:55:33.357655 1935 reconciler_common.go:299] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-flexvol-driver-host\") on node \"ci-3510-3-7-n-7f05b50207.novalocal\" DevicePath \"\"" May 13 06:55:33.357866 kubelet[1935]: I0513 06:55:33.357814 1935 reconciler_common.go:299] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-var-lib-calico\") on node \"ci-3510-3-7-n-7f05b50207.novalocal\" DevicePath \"\"" May 13 06:55:33.357977 kubelet[1935]: I0513 06:55:33.357961 1935 reconciler_common.go:299] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-var-run-calico\") on node \"ci-3510-3-7-n-7f05b50207.novalocal\" DevicePath \"\"" May 13 06:55:33.358080 kubelet[1935]: I0513 06:55:33.358067 1935 reconciler_common.go:299] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-cni-net-dir\") on node \"ci-3510-3-7-n-7f05b50207.novalocal\" DevicePath \"\"" May 13 06:55:33.358180 kubelet[1935]: I0513 06:55:33.358168 1935 reconciler_common.go:299] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-cni-bin-dir\") on node \"ci-3510-3-7-n-7f05b50207.novalocal\" DevicePath \"\"" May 13 06:55:33.358308 kubelet[1935]: I0513 06:55:33.358295 1935 reconciler_common.go:299] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-xtables-lock\") on node \"ci-3510-3-7-n-7f05b50207.novalocal\" DevicePath \"\"" May 13 06:55:33.358409 kubelet[1935]: I0513 06:55:33.358396 1935 reconciler_common.go:299] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/c92e971b-9e06-4663-88bb-6baef3cbe71a-cni-log-dir\") on node \"ci-3510-3-7-n-7f05b50207.novalocal\" DevicePath \"\"" May 13 06:55:33.359754 kubelet[1935]: I0513 06:55:33.359734 1935 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/9f406868-14be-4f07-a347-37e45f4acb44-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "9f406868-14be-4f07-a347-37e45f4acb44" (UID: "9f406868-14be-4f07-a347-37e45f4acb44"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 13 06:55:33.362990 kubelet[1935]: I0513 06:55:33.362490 1935 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/9f406868-14be-4f07-a347-37e45f4acb44-kube-api-access-kvn8v" (OuterVolumeSpecName: "kube-api-access-kvn8v") pod "9f406868-14be-4f07-a347-37e45f4acb44" (UID: "9f406868-14be-4f07-a347-37e45f4acb44"). InnerVolumeSpecName "kube-api-access-kvn8v". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 13 06:55:33.459773 kubelet[1935]: I0513 06:55:33.459715 1935 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-kvn8v\" (UniqueName: \"kubernetes.io/projected/9f406868-14be-4f07-a347-37e45f4acb44-kube-api-access-kvn8v\") on node \"ci-3510-3-7-n-7f05b50207.novalocal\" DevicePath \"\"" May 13 06:55:33.460236 kubelet[1935]: I0513 06:55:33.460203 1935 reconciler_common.go:299] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9f406868-14be-4f07-a347-37e45f4acb44-tigera-ca-bundle\") on node \"ci-3510-3-7-n-7f05b50207.novalocal\" DevicePath \"\"" May 13 06:55:33.476496 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937-rootfs.mount: Deactivated successfully. May 13 06:55:33.476706 systemd[1]: var-lib-kubelet-pods-9f406868\x2d14be\x2d4f07\x2da347\x2d37e45f4acb44-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dkube\x2dcontrollers-1.mount: Deactivated successfully. May 13 06:55:33.476879 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279-rootfs.mount: Deactivated successfully. May 13 06:55:33.477069 systemd[1]: run-netns-cni\x2df914553c\x2d0b9e\x2d6b7a\x2d3e31\x2d58bb525f5c37.mount: Deactivated successfully. May 13 06:55:33.477202 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279-shm.mount: Deactivated successfully. May 13 06:55:33.477355 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a-rootfs.mount: Deactivated successfully. May 13 06:55:33.477486 systemd[1]: var-lib-kubelet-pods-c92e971b\x2d9e06\x2d4663\x2d88bb\x2d6baef3cbe71a-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. May 13 06:55:33.477648 systemd[1]: var-lib-kubelet-pods-9f406868\x2d14be\x2d4f07\x2da347\x2d37e45f4acb44-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dkvn8v.mount: Deactivated successfully. May 13 06:55:33.477791 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-51343e923587e69c5873f41cfd42af9a536d33902f9ba35828ea33ee017b0eeb-rootfs.mount: Deactivated successfully. May 13 06:55:33.477974 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-51343e923587e69c5873f41cfd42af9a536d33902f9ba35828ea33ee017b0eeb-shm.mount: Deactivated successfully. May 13 06:55:33.478121 systemd[1]: var-lib-kubelet-pods-c92e971b\x2d9e06\x2d4663\x2d88bb\x2d6baef3cbe71a-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dq5d5l.mount: Deactivated successfully. May 13 06:55:33.478258 systemd[1]: var-lib-kubelet-pods-c92e971b\x2d9e06\x2d4663\x2d88bb\x2d6baef3cbe71a-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. May 13 06:55:33.525488 env[1155]: time="2025-05-13T06:55:33.525189205Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-mjm6h,Uid:d33f01d1-0475-476f-95fd-0e1e60baa90e,Namespace:calico-system,Attempt:0,}" May 13 06:55:33.551046 env[1155]: time="2025-05-13T06:55:33.550461598Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 06:55:33.551046 env[1155]: time="2025-05-13T06:55:33.550534388Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 06:55:33.551046 env[1155]: time="2025-05-13T06:55:33.550566215Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 06:55:33.551046 env[1155]: time="2025-05-13T06:55:33.550796136Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cbe8d8ba90f7bfa3acb1ae3b88b4fb97b19c1eb72a804fda2ca626cb524a53ae pid=5280 runtime=io.containerd.runc.v2 May 13 06:55:33.602629 systemd[1]: Started cri-containerd-cbe8d8ba90f7bfa3acb1ae3b88b4fb97b19c1eb72a804fda2ca626cb524a53ae.scope. May 13 06:55:33.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.611000 audit: BPF prog-id=224 op=LOAD May 13 06:55:33.612000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5280 pid=5292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:33.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362653864386261393066376266613361636231616533623838623466 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=5280 pid=5292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:33.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362653864386261393066376266613361636231616533623838623466 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit: BPF prog-id=225 op=LOAD May 13 06:55:33.612000 audit[5292]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003106b0 items=0 ppid=5280 pid=5292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:33.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362653864386261393066376266613361636231616533623838623466 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit: BPF prog-id=226 op=LOAD May 13 06:55:33.612000 audit[5292]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003106f8 items=0 ppid=5280 pid=5292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:33.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362653864386261393066376266613361636231616533623838623466 May 13 06:55:33.612000 audit: BPF prog-id=226 op=UNLOAD May 13 06:55:33.612000 audit: BPF prog-id=225 op=UNLOAD May 13 06:55:33.612000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { perfmon } for pid=5292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit[5292]: AVC avc: denied { bpf } for pid=5292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.612000 audit: BPF prog-id=227 op=LOAD May 13 06:55:33.612000 audit[5292]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000310b08 items=0 ppid=5280 pid=5292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:33.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362653864386261393066376266613361636231616533623838623466 May 13 06:55:33.626798 env[1155]: time="2025-05-13T06:55:33.626760146Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-mjm6h,Uid:d33f01d1-0475-476f-95fd-0e1e60baa90e,Namespace:calico-system,Attempt:0,} returns sandbox id \"cbe8d8ba90f7bfa3acb1ae3b88b4fb97b19c1eb72a804fda2ca626cb524a53ae\"" May 13 06:55:33.630449 env[1155]: time="2025-05-13T06:55:33.630417644Z" level=info msg="CreateContainer within sandbox \"cbe8d8ba90f7bfa3acb1ae3b88b4fb97b19c1eb72a804fda2ca626cb524a53ae\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 13 06:55:33.647339 env[1155]: time="2025-05-13T06:55:33.647282508Z" level=info msg="CreateContainer within sandbox \"cbe8d8ba90f7bfa3acb1ae3b88b4fb97b19c1eb72a804fda2ca626cb524a53ae\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"ce2edf26669b25a5f8bfb36c381cc299f8e193beea911779ef22e54c90d01315\"" May 13 06:55:33.650311 env[1155]: time="2025-05-13T06:55:33.650256323Z" level=info msg="StartContainer for \"ce2edf26669b25a5f8bfb36c381cc299f8e193beea911779ef22e54c90d01315\"" May 13 06:55:33.668669 systemd[1]: Started cri-containerd-ce2edf26669b25a5f8bfb36c381cc299f8e193beea911779ef22e54c90d01315.scope. May 13 06:55:33.686000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.686000 audit[5323]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f7a15fbe918 items=0 ppid=5280 pid=5323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:33.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365326564663236363639623235613566386266623336633338316363 May 13 06:55:33.686000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.686000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.686000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.686000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.686000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.686000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.686000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.686000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.686000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.686000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.686000 audit: BPF prog-id=228 op=LOAD May 13 06:55:33.686000 audit[5323]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002d3d68 items=0 ppid=5280 pid=5323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:33.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365326564663236363639623235613566386266623336633338316363 May 13 06:55:33.686000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.686000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.686000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.686000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.686000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.686000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.686000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.686000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.686000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.686000 audit: BPF prog-id=229 op=LOAD May 13 06:55:33.686000 audit[5323]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002d3db8 items=0 ppid=5280 pid=5323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:33.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365326564663236363639623235613566386266623336633338316363 May 13 06:55:33.686000 audit: BPF prog-id=229 op=UNLOAD May 13 06:55:33.687000 audit: BPF prog-id=228 op=UNLOAD May 13 06:55:33.687000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.687000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.687000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.687000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.687000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.687000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.687000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.687000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.687000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.687000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:33.687000 audit: BPF prog-id=230 op=LOAD May 13 06:55:33.687000 audit[5323]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002d3e48 items=0 ppid=5280 pid=5323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:33.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365326564663236363639623235613566386266623336633338316363 May 13 06:55:33.705030 env[1155]: time="2025-05-13T06:55:33.704979907Z" level=info msg="StartContainer for \"ce2edf26669b25a5f8bfb36c381cc299f8e193beea911779ef22e54c90d01315\" returns successfully" May 13 06:55:33.722420 systemd[1]: cri-containerd-ce2edf26669b25a5f8bfb36c381cc299f8e193beea911779ef22e54c90d01315.scope: Deactivated successfully. May 13 06:55:33.726000 audit: BPF prog-id=230 op=UNLOAD May 13 06:55:33.758510 env[1155]: time="2025-05-13T06:55:33.758443961Z" level=info msg="shim disconnected" id=ce2edf26669b25a5f8bfb36c381cc299f8e193beea911779ef22e54c90d01315 May 13 06:55:33.758510 env[1155]: time="2025-05-13T06:55:33.758491727Z" level=warning msg="cleaning up after shim disconnected" id=ce2edf26669b25a5f8bfb36c381cc299f8e193beea911779ef22e54c90d01315 namespace=k8s.io May 13 06:55:33.758510 env[1155]: time="2025-05-13T06:55:33.758502396Z" level=info msg="cleaning up dead shim" May 13 06:55:33.767867 env[1155]: time="2025-05-13T06:55:33.767822835Z" level=warning msg="cleanup warnings time=\"2025-05-13T06:55:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5364 runtime=io.containerd.runc.v2\n" May 13 06:55:33.860318 kubelet[1935]: I0513 06:55:33.860272 1935 scope.go:117] "RemoveContainer" containerID="7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a" May 13 06:55:33.865254 systemd[1]: Removed slice kubepods-besteffort-podc92e971b_9e06_4663_88bb_6baef3cbe71a.slice. May 13 06:55:33.865476 systemd[1]: kubepods-besteffort-podc92e971b_9e06_4663_88bb_6baef3cbe71a.slice: Consumed 2.909s CPU time. May 13 06:55:33.869353 env[1155]: time="2025-05-13T06:55:33.868981468Z" level=info msg="RemoveContainer for \"7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a\"" May 13 06:55:33.883118 systemd[1]: Removed slice kubepods-besteffort-pod9f406868_14be_4f07_a347_37e45f4acb44.slice. May 13 06:55:33.888911 env[1155]: time="2025-05-13T06:55:33.888817663Z" level=info msg="RemoveContainer for \"7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a\" returns successfully" May 13 06:55:33.891448 kubelet[1935]: I0513 06:55:33.891414 1935 scope.go:117] "RemoveContainer" containerID="c7b275d6227021ef9c80e8b928b04624acdc8c5356dd68acb59ad6ec9d351e46" May 13 06:55:33.899770 env[1155]: time="2025-05-13T06:55:33.899687222Z" level=info msg="RemoveContainer for \"c7b275d6227021ef9c80e8b928b04624acdc8c5356dd68acb59ad6ec9d351e46\"" May 13 06:55:33.910326 env[1155]: time="2025-05-13T06:55:33.910035018Z" level=info msg="CreateContainer within sandbox \"cbe8d8ba90f7bfa3acb1ae3b88b4fb97b19c1eb72a804fda2ca626cb524a53ae\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 13 06:55:33.922963 env[1155]: time="2025-05-13T06:55:33.918359939Z" level=info msg="RemoveContainer for \"c7b275d6227021ef9c80e8b928b04624acdc8c5356dd68acb59ad6ec9d351e46\" returns successfully" May 13 06:55:33.923187 kubelet[1935]: I0513 06:55:33.918608 1935 scope.go:117] "RemoveContainer" containerID="921dbd493b4245522cff89fd2c80700b3e276f6c78752a6b911bf3921eaf41ea" May 13 06:55:33.924868 env[1155]: time="2025-05-13T06:55:33.924825044Z" level=info msg="RemoveContainer for \"921dbd493b4245522cff89fd2c80700b3e276f6c78752a6b911bf3921eaf41ea\"" May 13 06:55:33.938706 env[1155]: time="2025-05-13T06:55:33.938581623Z" level=info msg="RemoveContainer for \"921dbd493b4245522cff89fd2c80700b3e276f6c78752a6b911bf3921eaf41ea\" returns successfully" May 13 06:55:33.938857 kubelet[1935]: I0513 06:55:33.938780 1935 scope.go:117] "RemoveContainer" containerID="7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a" May 13 06:55:33.939184 env[1155]: time="2025-05-13T06:55:33.939118343Z" level=error msg="ContainerStatus for \"7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a\": not found" May 13 06:55:33.939276 kubelet[1935]: E0513 06:55:33.939257 1935 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a\": not found" containerID="7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a" May 13 06:55:33.939326 kubelet[1935]: I0513 06:55:33.939281 1935 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a"} err="failed to get container status \"7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a\": rpc error: code = NotFound desc = an error occurred when try to find container \"7b5d4aa8c7ee01fba973a5802e675f018640c83897a424f5d2458567e853922a\": not found" May 13 06:55:33.939326 kubelet[1935]: I0513 06:55:33.939301 1935 scope.go:117] "RemoveContainer" containerID="c7b275d6227021ef9c80e8b928b04624acdc8c5356dd68acb59ad6ec9d351e46" May 13 06:55:33.939541 env[1155]: time="2025-05-13T06:55:33.939454263Z" level=error msg="ContainerStatus for \"c7b275d6227021ef9c80e8b928b04624acdc8c5356dd68acb59ad6ec9d351e46\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"c7b275d6227021ef9c80e8b928b04624acdc8c5356dd68acb59ad6ec9d351e46\": not found" May 13 06:55:33.939598 kubelet[1935]: E0513 06:55:33.939568 1935 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"c7b275d6227021ef9c80e8b928b04624acdc8c5356dd68acb59ad6ec9d351e46\": not found" containerID="c7b275d6227021ef9c80e8b928b04624acdc8c5356dd68acb59ad6ec9d351e46" May 13 06:55:33.939598 kubelet[1935]: I0513 06:55:33.939587 1935 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"c7b275d6227021ef9c80e8b928b04624acdc8c5356dd68acb59ad6ec9d351e46"} err="failed to get container status \"c7b275d6227021ef9c80e8b928b04624acdc8c5356dd68acb59ad6ec9d351e46\": rpc error: code = NotFound desc = an error occurred when try to find container \"c7b275d6227021ef9c80e8b928b04624acdc8c5356dd68acb59ad6ec9d351e46\": not found" May 13 06:55:33.939703 kubelet[1935]: I0513 06:55:33.939601 1935 scope.go:117] "RemoveContainer" containerID="921dbd493b4245522cff89fd2c80700b3e276f6c78752a6b911bf3921eaf41ea" May 13 06:55:33.939798 env[1155]: time="2025-05-13T06:55:33.939735806Z" level=error msg="ContainerStatus for \"921dbd493b4245522cff89fd2c80700b3e276f6c78752a6b911bf3921eaf41ea\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"921dbd493b4245522cff89fd2c80700b3e276f6c78752a6b911bf3921eaf41ea\": not found" May 13 06:55:33.939870 kubelet[1935]: E0513 06:55:33.939856 1935 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"921dbd493b4245522cff89fd2c80700b3e276f6c78752a6b911bf3921eaf41ea\": not found" containerID="921dbd493b4245522cff89fd2c80700b3e276f6c78752a6b911bf3921eaf41ea" May 13 06:55:33.939908 kubelet[1935]: I0513 06:55:33.939874 1935 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"921dbd493b4245522cff89fd2c80700b3e276f6c78752a6b911bf3921eaf41ea"} err="failed to get container status \"921dbd493b4245522cff89fd2c80700b3e276f6c78752a6b911bf3921eaf41ea\": rpc error: code = NotFound desc = an error occurred when try to find container \"921dbd493b4245522cff89fd2c80700b3e276f6c78752a6b911bf3921eaf41ea\": not found" May 13 06:55:33.939908 kubelet[1935]: I0513 06:55:33.939888 1935 scope.go:117] "RemoveContainer" containerID="65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937" May 13 06:55:33.940969 env[1155]: time="2025-05-13T06:55:33.940939147Z" level=info msg="RemoveContainer for \"65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937\"" May 13 06:55:33.947507 env[1155]: time="2025-05-13T06:55:33.947468508Z" level=info msg="RemoveContainer for \"65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937\" returns successfully" May 13 06:55:33.948096 kubelet[1935]: I0513 06:55:33.948066 1935 scope.go:117] "RemoveContainer" containerID="65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937" May 13 06:55:33.948732 env[1155]: time="2025-05-13T06:55:33.948646393Z" level=error msg="ContainerStatus for \"65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937\": not found" May 13 06:55:33.949116 kubelet[1935]: E0513 06:55:33.949076 1935 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937\": not found" containerID="65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937" May 13 06:55:33.949210 kubelet[1935]: I0513 06:55:33.949112 1935 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937"} err="failed to get container status \"65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937\": rpc error: code = NotFound desc = an error occurred when try to find container \"65f93bd538cdf7d596437b0a2be029f2d56b97016b82be957af9a528114a0937\": not found" May 13 06:55:33.954749 env[1155]: time="2025-05-13T06:55:33.954711634Z" level=info msg="CreateContainer within sandbox \"cbe8d8ba90f7bfa3acb1ae3b88b4fb97b19c1eb72a804fda2ca626cb524a53ae\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"97bb1754a0230693434065c2ae41607d93fd82f66749756bee99d47f8a63d092\"" May 13 06:55:33.955637 env[1155]: time="2025-05-13T06:55:33.955569297Z" level=info msg="StartContainer for \"97bb1754a0230693434065c2ae41607d93fd82f66749756bee99d47f8a63d092\"" May 13 06:55:33.980130 systemd[1]: Started cri-containerd-97bb1754a0230693434065c2ae41607d93fd82f66749756bee99d47f8a63d092.scope. May 13 06:55:34.023000 audit[5388]: AVC avc: denied { perfmon } for pid=5388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f9ee1a87298 items=0 ppid=5280 pid=5388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:34.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937626231373534613032333036393334333430363563326165343136 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { bpf } for pid=5388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { bpf } for pid=5388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { bpf } for pid=5388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { perfmon } for pid=5388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { perfmon } for pid=5388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { perfmon } for pid=5388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { perfmon } for pid=5388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { perfmon } for pid=5388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { bpf } for pid=5388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { bpf } for pid=5388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit: BPF prog-id=231 op=LOAD May 13 06:55:34.023000 audit[5388]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001e9e68 items=0 ppid=5280 pid=5388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:34.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937626231373534613032333036393334333430363563326165343136 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { bpf } for pid=5388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { bpf } for pid=5388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { perfmon } for pid=5388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { perfmon } for pid=5388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { perfmon } for pid=5388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { perfmon } for pid=5388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { perfmon } for pid=5388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { bpf } for pid=5388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { bpf } for pid=5388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit: BPF prog-id=232 op=LOAD May 13 06:55:34.023000 audit[5388]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001e9eb8 items=0 ppid=5280 pid=5388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:34.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937626231373534613032333036393334333430363563326165343136 May 13 06:55:34.023000 audit: BPF prog-id=232 op=UNLOAD May 13 06:55:34.023000 audit: BPF prog-id=231 op=UNLOAD May 13 06:55:34.023000 audit[5388]: AVC avc: denied { bpf } for pid=5388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { bpf } for pid=5388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { bpf } for pid=5388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { perfmon } for pid=5388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { perfmon } for pid=5388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { perfmon } for pid=5388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { perfmon } for pid=5388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { perfmon } for pid=5388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { bpf } for pid=5388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit[5388]: AVC avc: denied { bpf } for pid=5388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:34.023000 audit: BPF prog-id=233 op=LOAD May 13 06:55:34.023000 audit[5388]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001e9f48 items=0 ppid=5280 pid=5388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:34.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937626231373534613032333036393334333430363563326165343136 May 13 06:55:34.048969 env[1155]: time="2025-05-13T06:55:34.048896844Z" level=info msg="StartContainer for \"97bb1754a0230693434065c2ae41607d93fd82f66749756bee99d47f8a63d092\" returns successfully" May 13 06:55:34.053644 systemd[1]: cri-containerd-0cd8c6ed746f64e76e3966929c35a2da375256f0dba343c0e4dd04894bae932e.scope: Deactivated successfully. May 13 06:55:34.052000 audit: BPF prog-id=126 op=UNLOAD May 13 06:55:34.057000 audit: BPF prog-id=129 op=UNLOAD May 13 06:55:34.089234 env[1155]: time="2025-05-13T06:55:34.089188515Z" level=info msg="shim disconnected" id=0cd8c6ed746f64e76e3966929c35a2da375256f0dba343c0e4dd04894bae932e May 13 06:55:34.089479 env[1155]: time="2025-05-13T06:55:34.089447879Z" level=warning msg="cleaning up after shim disconnected" id=0cd8c6ed746f64e76e3966929c35a2da375256f0dba343c0e4dd04894bae932e namespace=k8s.io May 13 06:55:34.089625 env[1155]: time="2025-05-13T06:55:34.089607465Z" level=info msg="cleaning up dead shim" May 13 06:55:34.101827 env[1155]: time="2025-05-13T06:55:34.101786031Z" level=warning msg="cleanup warnings time=\"2025-05-13T06:55:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5427 runtime=io.containerd.runc.v2\n" May 13 06:55:34.119685 env[1155]: time="2025-05-13T06:55:34.119645525Z" level=info msg="StopContainer for \"0cd8c6ed746f64e76e3966929c35a2da375256f0dba343c0e4dd04894bae932e\" returns successfully" May 13 06:55:34.120528 env[1155]: time="2025-05-13T06:55:34.120504192Z" level=info msg="StopPodSandbox for \"d49f46d7ff5366d535ed829232c20e3ee4f3c942fe48d2f6875c6d1390fc553a\"" May 13 06:55:34.120695 env[1155]: time="2025-05-13T06:55:34.120670960Z" level=info msg="Container to stop \"0cd8c6ed746f64e76e3966929c35a2da375256f0dba343c0e4dd04894bae932e\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 13 06:55:34.126000 audit: BPF prog-id=118 op=UNLOAD May 13 06:55:34.127515 systemd[1]: cri-containerd-d49f46d7ff5366d535ed829232c20e3ee4f3c942fe48d2f6875c6d1390fc553a.scope: Deactivated successfully. May 13 06:55:34.131000 audit: BPF prog-id=121 op=UNLOAD May 13 06:55:34.156734 env[1155]: time="2025-05-13T06:55:34.156686750Z" level=info msg="shim disconnected" id=d49f46d7ff5366d535ed829232c20e3ee4f3c942fe48d2f6875c6d1390fc553a May 13 06:55:34.157270 env[1155]: time="2025-05-13T06:55:34.157252171Z" level=warning msg="cleaning up after shim disconnected" id=d49f46d7ff5366d535ed829232c20e3ee4f3c942fe48d2f6875c6d1390fc553a namespace=k8s.io May 13 06:55:34.157353 env[1155]: time="2025-05-13T06:55:34.157338817Z" level=info msg="cleaning up dead shim" May 13 06:55:34.169620 env[1155]: time="2025-05-13T06:55:34.169574975Z" level=warning msg="cleanup warnings time=\"2025-05-13T06:55:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5458 runtime=io.containerd.runc.v2\n" May 13 06:55:34.182946 env[1155]: time="2025-05-13T06:55:34.182887992Z" level=info msg="TearDown network for sandbox \"d49f46d7ff5366d535ed829232c20e3ee4f3c942fe48d2f6875c6d1390fc553a\" successfully" May 13 06:55:34.183165 env[1155]: time="2025-05-13T06:55:34.183139383Z" level=info msg="StopPodSandbox for \"d49f46d7ff5366d535ed829232c20e3ee4f3c942fe48d2f6875c6d1390fc553a\" returns successfully" May 13 06:55:34.209540 kubelet[1935]: I0513 06:55:34.209513 1935 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="9f406868-14be-4f07-a347-37e45f4acb44" path="/var/lib/kubelet/pods/9f406868-14be-4f07-a347-37e45f4acb44/volumes" May 13 06:55:34.210160 kubelet[1935]: I0513 06:55:34.210143 1935 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="c92e971b-9e06-4663-88bb-6baef3cbe71a" path="/var/lib/kubelet/pods/c92e971b-9e06-4663-88bb-6baef3cbe71a/volumes" May 13 06:55:34.224000 audit[5472]: NETFILTER_CFG table=filter:132 family=2 entries=9 op=nft_register_rule pid=5472 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:34.224000 audit[5472]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffee8da61f0 a2=0 a3=7ffee8da61dc items=0 ppid=2110 pid=5472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:34.224000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:34.228000 audit[5472]: NETFILTER_CFG table=nat:133 family=2 entries=27 op=nft_unregister_chain pid=5472 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:34.228000 audit[5472]: SYSCALL arch=c000003e syscall=46 success=yes exit=6028 a0=3 a1=7ffee8da61f0 a2=0 a3=7ffee8da61dc items=0 ppid=2110 pid=5472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:34.228000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:34.269193 kubelet[1935]: I0513 06:55:34.269137 1935 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4af1dbe8-fdce-4649-9009-84e25d397b32-tigera-ca-bundle\") pod \"4af1dbe8-fdce-4649-9009-84e25d397b32\" (UID: \"4af1dbe8-fdce-4649-9009-84e25d397b32\") " May 13 06:55:34.269401 kubelet[1935]: I0513 06:55:34.269383 1935 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-xqmsm\" (UniqueName: \"kubernetes.io/projected/4af1dbe8-fdce-4649-9009-84e25d397b32-kube-api-access-xqmsm\") pod \"4af1dbe8-fdce-4649-9009-84e25d397b32\" (UID: \"4af1dbe8-fdce-4649-9009-84e25d397b32\") " May 13 06:55:34.269548 kubelet[1935]: I0513 06:55:34.269534 1935 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/4af1dbe8-fdce-4649-9009-84e25d397b32-typha-certs\") pod \"4af1dbe8-fdce-4649-9009-84e25d397b32\" (UID: \"4af1dbe8-fdce-4649-9009-84e25d397b32\") " May 13 06:55:34.272838 kubelet[1935]: I0513 06:55:34.272804 1935 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/4af1dbe8-fdce-4649-9009-84e25d397b32-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "4af1dbe8-fdce-4649-9009-84e25d397b32" (UID: "4af1dbe8-fdce-4649-9009-84e25d397b32"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 13 06:55:34.273118 kubelet[1935]: I0513 06:55:34.273072 1935 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/4af1dbe8-fdce-4649-9009-84e25d397b32-kube-api-access-xqmsm" (OuterVolumeSpecName: "kube-api-access-xqmsm") pod "4af1dbe8-fdce-4649-9009-84e25d397b32" (UID: "4af1dbe8-fdce-4649-9009-84e25d397b32"). InnerVolumeSpecName "kube-api-access-xqmsm". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 13 06:55:34.277184 kubelet[1935]: I0513 06:55:34.277148 1935 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/4af1dbe8-fdce-4649-9009-84e25d397b32-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "4af1dbe8-fdce-4649-9009-84e25d397b32" (UID: "4af1dbe8-fdce-4649-9009-84e25d397b32"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 13 06:55:34.370259 kubelet[1935]: I0513 06:55:34.370148 1935 reconciler_common.go:299] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/4af1dbe8-fdce-4649-9009-84e25d397b32-typha-certs\") on node \"ci-3510-3-7-n-7f05b50207.novalocal\" DevicePath \"\"" May 13 06:55:34.370259 kubelet[1935]: I0513 06:55:34.370207 1935 reconciler_common.go:299] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4af1dbe8-fdce-4649-9009-84e25d397b32-tigera-ca-bundle\") on node \"ci-3510-3-7-n-7f05b50207.novalocal\" DevicePath \"\"" May 13 06:55:34.370443 kubelet[1935]: I0513 06:55:34.370239 1935 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-xqmsm\" (UniqueName: \"kubernetes.io/projected/4af1dbe8-fdce-4649-9009-84e25d397b32-kube-api-access-xqmsm\") on node \"ci-3510-3-7-n-7f05b50207.novalocal\" DevicePath \"\"" May 13 06:55:34.474978 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0cd8c6ed746f64e76e3966929c35a2da375256f0dba343c0e4dd04894bae932e-rootfs.mount: Deactivated successfully. May 13 06:55:34.475181 systemd[1]: var-lib-kubelet-pods-4af1dbe8\x2dfdce\x2d4649\x2d9009\x2d84e25d397b32-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. May 13 06:55:34.475344 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d49f46d7ff5366d535ed829232c20e3ee4f3c942fe48d2f6875c6d1390fc553a-rootfs.mount: Deactivated successfully. May 13 06:55:34.475498 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d49f46d7ff5366d535ed829232c20e3ee4f3c942fe48d2f6875c6d1390fc553a-shm.mount: Deactivated successfully. May 13 06:55:34.475651 systemd[1]: var-lib-kubelet-pods-4af1dbe8\x2dfdce\x2d4649\x2d9009\x2d84e25d397b32-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dxqmsm.mount: Deactivated successfully. May 13 06:55:34.475829 systemd[1]: var-lib-kubelet-pods-4af1dbe8\x2dfdce\x2d4649\x2d9009\x2d84e25d397b32-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. May 13 06:55:34.910857 kubelet[1935]: I0513 06:55:34.910828 1935 scope.go:117] "RemoveContainer" containerID="0cd8c6ed746f64e76e3966929c35a2da375256f0dba343c0e4dd04894bae932e" May 13 06:55:34.917032 systemd[1]: Removed slice kubepods-besteffort-pod4af1dbe8_fdce_4649_9009_84e25d397b32.slice. May 13 06:55:34.919801 env[1155]: time="2025-05-13T06:55:34.919747675Z" level=info msg="RemoveContainer for \"0cd8c6ed746f64e76e3966929c35a2da375256f0dba343c0e4dd04894bae932e\"" May 13 06:55:34.926122 env[1155]: time="2025-05-13T06:55:34.926076422Z" level=info msg="RemoveContainer for \"0cd8c6ed746f64e76e3966929c35a2da375256f0dba343c0e4dd04894bae932e\" returns successfully" May 13 06:55:34.926413 kubelet[1935]: I0513 06:55:34.926394 1935 scope.go:117] "RemoveContainer" containerID="0cd8c6ed746f64e76e3966929c35a2da375256f0dba343c0e4dd04894bae932e" May 13 06:55:34.926804 env[1155]: time="2025-05-13T06:55:34.926735762Z" level=error msg="ContainerStatus for \"0cd8c6ed746f64e76e3966929c35a2da375256f0dba343c0e4dd04894bae932e\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"0cd8c6ed746f64e76e3966929c35a2da375256f0dba343c0e4dd04894bae932e\": not found" May 13 06:55:34.927017 kubelet[1935]: E0513 06:55:34.926999 1935 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"0cd8c6ed746f64e76e3966929c35a2da375256f0dba343c0e4dd04894bae932e\": not found" containerID="0cd8c6ed746f64e76e3966929c35a2da375256f0dba343c0e4dd04894bae932e" May 13 06:55:34.927122 kubelet[1935]: I0513 06:55:34.927099 1935 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"0cd8c6ed746f64e76e3966929c35a2da375256f0dba343c0e4dd04894bae932e"} err="failed to get container status \"0cd8c6ed746f64e76e3966929c35a2da375256f0dba343c0e4dd04894bae932e\": rpc error: code = NotFound desc = an error occurred when try to find container \"0cd8c6ed746f64e76e3966929c35a2da375256f0dba343c0e4dd04894bae932e\": not found" May 13 06:55:34.969437 env[1155]: time="2025-05-13T06:55:34.969394409Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/10-calico.conflist\": WRITE)" error="cni config load failed: failed to load CNI config list file /etc/cni/net.d/10-calico.conflist: error parsing configuration list: unexpected end of JSON input: invalid cni config: failed to load cni config" May 13 06:55:34.972320 systemd[1]: cri-containerd-97bb1754a0230693434065c2ae41607d93fd82f66749756bee99d47f8a63d092.scope: Deactivated successfully. May 13 06:55:34.975000 audit: BPF prog-id=233 op=UNLOAD May 13 06:55:34.995987 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-97bb1754a0230693434065c2ae41607d93fd82f66749756bee99d47f8a63d092-rootfs.mount: Deactivated successfully. May 13 06:55:35.008664 env[1155]: time="2025-05-13T06:55:35.008622555Z" level=info msg="shim disconnected" id=97bb1754a0230693434065c2ae41607d93fd82f66749756bee99d47f8a63d092 May 13 06:55:35.008890 env[1155]: time="2025-05-13T06:55:35.008870840Z" level=warning msg="cleaning up after shim disconnected" id=97bb1754a0230693434065c2ae41607d93fd82f66749756bee99d47f8a63d092 namespace=k8s.io May 13 06:55:35.009018 env[1155]: time="2025-05-13T06:55:35.009002315Z" level=info msg="cleaning up dead shim" May 13 06:55:35.016806 env[1155]: time="2025-05-13T06:55:35.016764075Z" level=warning msg="cleanup warnings time=\"2025-05-13T06:55:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5489 runtime=io.containerd.runc.v2\n" May 13 06:55:35.768656 kubelet[1935]: I0513 06:55:35.768587 1935 memory_manager.go:355] "RemoveStaleState removing state" podUID="4af1dbe8-fdce-4649-9009-84e25d397b32" containerName="calico-typha" May 13 06:55:35.768656 kubelet[1935]: I0513 06:55:35.768643 1935 memory_manager.go:355] "RemoveStaleState removing state" podUID="9f406868-14be-4f07-a347-37e45f4acb44" containerName="calico-kube-controllers" May 13 06:55:35.783200 systemd[1]: Created slice kubepods-besteffort-pod3f5355c6_e1f2_4a44_bf5a_a5bedb0f70b8.slice. May 13 06:55:35.836000 audit[5502]: NETFILTER_CFG table=filter:134 family=2 entries=10 op=nft_register_rule pid=5502 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:35.836000 audit[5502]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff3edd10a0 a2=0 a3=7fff3edd108c items=0 ppid=2110 pid=5502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:35.836000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:35.841000 audit[5502]: NETFILTER_CFG table=nat:135 family=2 entries=20 op=nft_register_rule pid=5502 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:35.841000 audit[5502]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff3edd10a0 a2=0 a3=7fff3edd108c items=0 ppid=2110 pid=5502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:35.841000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:35.881118 kubelet[1935]: I0513 06:55:35.881028 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3f5355c6-e1f2-4a44-bf5a-a5bedb0f70b8-tigera-ca-bundle\") pod \"calico-typha-6d58f5ddb8-zpxfk\" (UID: \"3f5355c6-e1f2-4a44-bf5a-a5bedb0f70b8\") " pod="calico-system/calico-typha-6d58f5ddb8-zpxfk" May 13 06:55:35.881312 kubelet[1935]: I0513 06:55:35.881151 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/3f5355c6-e1f2-4a44-bf5a-a5bedb0f70b8-typha-certs\") pod \"calico-typha-6d58f5ddb8-zpxfk\" (UID: \"3f5355c6-e1f2-4a44-bf5a-a5bedb0f70b8\") " pod="calico-system/calico-typha-6d58f5ddb8-zpxfk" May 13 06:55:35.881401 kubelet[1935]: I0513 06:55:35.881342 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zd976\" (UniqueName: \"kubernetes.io/projected/3f5355c6-e1f2-4a44-bf5a-a5bedb0f70b8-kube-api-access-zd976\") pod \"calico-typha-6d58f5ddb8-zpxfk\" (UID: \"3f5355c6-e1f2-4a44-bf5a-a5bedb0f70b8\") " pod="calico-system/calico-typha-6d58f5ddb8-zpxfk" May 13 06:55:35.960463 env[1155]: time="2025-05-13T06:55:35.960378232Z" level=info msg="CreateContainer within sandbox \"cbe8d8ba90f7bfa3acb1ae3b88b4fb97b19c1eb72a804fda2ca626cb524a53ae\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 13 06:55:36.010103 env[1155]: time="2025-05-13T06:55:36.010063567Z" level=info msg="CreateContainer within sandbox \"cbe8d8ba90f7bfa3acb1ae3b88b4fb97b19c1eb72a804fda2ca626cb524a53ae\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"d10c6ca480ef1b90e96f35f701895afcc8e95210bedd37648a0403a4986d45d1\"" May 13 06:55:36.010871 env[1155]: time="2025-05-13T06:55:36.010849166Z" level=info msg="StartContainer for \"d10c6ca480ef1b90e96f35f701895afcc8e95210bedd37648a0403a4986d45d1\"" May 13 06:55:36.011160 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1539481715.mount: Deactivated successfully. May 13 06:55:36.037707 systemd[1]: Started cri-containerd-d10c6ca480ef1b90e96f35f701895afcc8e95210bedd37648a0403a4986d45d1.scope. May 13 06:55:36.054000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.054000 audit[5515]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7efea73f60a8 items=0 ppid=5280 pid=5515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:36.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431306336636134383065663162393065393666333566373031383935 May 13 06:55:36.054000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.054000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.054000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.054000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.054000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.054000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.054000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.054000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.054000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.054000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.054000 audit: BPF prog-id=234 op=LOAD May 13 06:55:36.054000 audit[5515]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f8cc8 items=0 ppid=5280 pid=5515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:36.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431306336636134383065663162393065393666333566373031383935 May 13 06:55:36.055000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.055000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.055000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.055000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.055000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.055000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.055000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.055000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.055000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.055000 audit: BPF prog-id=235 op=LOAD May 13 06:55:36.055000 audit[5515]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f8d18 items=0 ppid=5280 pid=5515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:36.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431306336636134383065663162393065393666333566373031383935 May 13 06:55:36.057000 audit: BPF prog-id=235 op=UNLOAD May 13 06:55:36.057000 audit: BPF prog-id=234 op=UNLOAD May 13 06:55:36.057000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.057000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.057000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.057000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.057000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.057000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.057000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.057000 audit[5515]: AVC avc: denied { perfmon } for pid=5515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.057000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.057000 audit[5515]: AVC avc: denied { bpf } for pid=5515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.057000 audit: BPF prog-id=236 op=LOAD May 13 06:55:36.057000 audit[5515]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f8da8 items=0 ppid=5280 pid=5515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:36.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431306336636134383065663162393065393666333566373031383935 May 13 06:55:36.077458 env[1155]: time="2025-05-13T06:55:36.077405798Z" level=info msg="StartContainer for \"d10c6ca480ef1b90e96f35f701895afcc8e95210bedd37648a0403a4986d45d1\" returns successfully" May 13 06:55:36.088075 env[1155]: time="2025-05-13T06:55:36.088020883Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6d58f5ddb8-zpxfk,Uid:3f5355c6-e1f2-4a44-bf5a-a5bedb0f70b8,Namespace:calico-system,Attempt:0,}" May 13 06:55:36.113035 env[1155]: time="2025-05-13T06:55:36.112935293Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 06:55:36.113035 env[1155]: time="2025-05-13T06:55:36.112985422Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 06:55:36.113359 env[1155]: time="2025-05-13T06:55:36.112999668Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 06:55:36.113993 env[1155]: time="2025-05-13T06:55:36.113362009Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/969da1b90242f0d86eeafcf88dd9dc5401f1fb687e428c467484aa5f4a11bf4c pid=5552 runtime=io.containerd.runc.v2 May 13 06:55:36.127120 systemd[1]: Started cri-containerd-969da1b90242f0d86eeafcf88dd9dc5401f1fb687e428c467484aa5f4a11bf4c.scope. May 13 06:55:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.147000 audit: BPF prog-id=237 op=LOAD May 13 06:55:36.148000 audit[5561]: AVC avc: denied { bpf } for pid=5561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5552 pid=5561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:36.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936396461316239303234326630643836656561666366383864643964 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { perfmon } for pid=5561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=5552 pid=5561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:36.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936396461316239303234326630643836656561666366383864643964 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { bpf } for pid=5561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { bpf } for pid=5561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { bpf } for pid=5561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { perfmon } for pid=5561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { perfmon } for pid=5561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { perfmon } for pid=5561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { perfmon } for pid=5561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { perfmon } for pid=5561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { bpf } for pid=5561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { bpf } for pid=5561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit: BPF prog-id=238 op=LOAD May 13 06:55:36.148000 audit[5561]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d4490 items=0 ppid=5552 pid=5561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:36.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936396461316239303234326630643836656561666366383864643964 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { bpf } for pid=5561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { bpf } for pid=5561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { perfmon } for pid=5561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { perfmon } for pid=5561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { perfmon } for pid=5561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { perfmon } for pid=5561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { perfmon } for pid=5561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { bpf } for pid=5561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { bpf } for pid=5561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit: BPF prog-id=239 op=LOAD May 13 06:55:36.148000 audit[5561]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d44d8 items=0 ppid=5552 pid=5561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:36.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936396461316239303234326630643836656561666366383864643964 May 13 06:55:36.148000 audit: BPF prog-id=239 op=UNLOAD May 13 06:55:36.148000 audit: BPF prog-id=238 op=UNLOAD May 13 06:55:36.148000 audit[5561]: AVC avc: denied { bpf } for pid=5561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { bpf } for pid=5561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { bpf } for pid=5561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { perfmon } for pid=5561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { perfmon } for pid=5561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { perfmon } for pid=5561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { perfmon } for pid=5561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { perfmon } for pid=5561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { bpf } for pid=5561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit[5561]: AVC avc: denied { bpf } for pid=5561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.148000 audit: BPF prog-id=240 op=LOAD May 13 06:55:36.148000 audit[5561]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d48e8 items=0 ppid=5552 pid=5561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:36.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936396461316239303234326630643836656561666366383864643964 May 13 06:55:36.178792 env[1155]: time="2025-05-13T06:55:36.178734977Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6d58f5ddb8-zpxfk,Uid:3f5355c6-e1f2-4a44-bf5a-a5bedb0f70b8,Namespace:calico-system,Attempt:0,} returns sandbox id \"969da1b90242f0d86eeafcf88dd9dc5401f1fb687e428c467484aa5f4a11bf4c\"" May 13 06:55:36.190210 env[1155]: time="2025-05-13T06:55:36.190159523Z" level=info msg="CreateContainer within sandbox \"969da1b90242f0d86eeafcf88dd9dc5401f1fb687e428c467484aa5f4a11bf4c\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 13 06:55:36.209530 kubelet[1935]: I0513 06:55:36.209501 1935 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="4af1dbe8-fdce-4649-9009-84e25d397b32" path="/var/lib/kubelet/pods/4af1dbe8-fdce-4649-9009-84e25d397b32/volumes" May 13 06:55:36.211427 env[1155]: time="2025-05-13T06:55:36.211368986Z" level=info msg="CreateContainer within sandbox \"969da1b90242f0d86eeafcf88dd9dc5401f1fb687e428c467484aa5f4a11bf4c\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"23b0df1cbde34ec1a1eb8988b05f4a35268ba40e65d7dbf701674d9895fc16b2\"" May 13 06:55:36.211992 env[1155]: time="2025-05-13T06:55:36.211966448Z" level=info msg="StartContainer for \"23b0df1cbde34ec1a1eb8988b05f4a35268ba40e65d7dbf701674d9895fc16b2\"" May 13 06:55:36.231541 systemd[1]: Started cri-containerd-23b0df1cbde34ec1a1eb8988b05f4a35268ba40e65d7dbf701674d9895fc16b2.scope. May 13 06:55:36.241945 systemd[1]: Created slice kubepods-besteffort-poda263530c_7958_441d_9c77_e0eaec1f0021.slice. May 13 06:55:36.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit: BPF prog-id=241 op=LOAD May 13 06:55:36.262000 audit[5597]: AVC avc: denied { bpf } for pid=5597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=5552 pid=5597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:36.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233623064663163626465333465633161316562383938386230356634 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { perfmon } for pid=5597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=5552 pid=5597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:36.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233623064663163626465333465633161316562383938386230356634 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { bpf } for pid=5597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { bpf } for pid=5597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { bpf } for pid=5597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { perfmon } for pid=5597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { perfmon } for pid=5597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { perfmon } for pid=5597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { perfmon } for pid=5597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { perfmon } for pid=5597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { bpf } for pid=5597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { bpf } for pid=5597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit: BPF prog-id=242 op=LOAD May 13 06:55:36.262000 audit[5597]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000325f00 items=0 ppid=5552 pid=5597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:36.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233623064663163626465333465633161316562383938386230356634 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { bpf } for pid=5597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { bpf } for pid=5597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { perfmon } for pid=5597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { perfmon } for pid=5597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { perfmon } for pid=5597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { perfmon } for pid=5597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { perfmon } for pid=5597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { bpf } for pid=5597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { bpf } for pid=5597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit: BPF prog-id=243 op=LOAD May 13 06:55:36.262000 audit[5597]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000325f48 items=0 ppid=5552 pid=5597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:36.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233623064663163626465333465633161316562383938386230356634 May 13 06:55:36.262000 audit: BPF prog-id=243 op=UNLOAD May 13 06:55:36.262000 audit: BPF prog-id=242 op=UNLOAD May 13 06:55:36.262000 audit[5597]: AVC avc: denied { bpf } for pid=5597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { bpf } for pid=5597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { bpf } for pid=5597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { perfmon } for pid=5597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { perfmon } for pid=5597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { perfmon } for pid=5597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { perfmon } for pid=5597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { perfmon } for pid=5597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { bpf } for pid=5597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit[5597]: AVC avc: denied { bpf } for pid=5597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.262000 audit: BPF prog-id=244 op=LOAD May 13 06:55:36.262000 audit[5597]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000386358 items=0 ppid=5552 pid=5597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:36.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233623064663163626465333465633161316562383938386230356634 May 13 06:55:36.287163 kubelet[1935]: I0513 06:55:36.287102 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a263530c-7958-441d-9c77-e0eaec1f0021-tigera-ca-bundle\") pod \"calico-kube-controllers-59cdf8fbb7-9krcc\" (UID: \"a263530c-7958-441d-9c77-e0eaec1f0021\") " pod="calico-system/calico-kube-controllers-59cdf8fbb7-9krcc" May 13 06:55:36.287163 kubelet[1935]: I0513 06:55:36.287159 1935 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9dlb4\" (UniqueName: \"kubernetes.io/projected/a263530c-7958-441d-9c77-e0eaec1f0021-kube-api-access-9dlb4\") pod \"calico-kube-controllers-59cdf8fbb7-9krcc\" (UID: \"a263530c-7958-441d-9c77-e0eaec1f0021\") " pod="calico-system/calico-kube-controllers-59cdf8fbb7-9krcc" May 13 06:55:36.305016 env[1155]: time="2025-05-13T06:55:36.304871833Z" level=info msg="StartContainer for \"23b0df1cbde34ec1a1eb8988b05f4a35268ba40e65d7dbf701674d9895fc16b2\" returns successfully" May 13 06:55:36.545560 env[1155]: time="2025-05-13T06:55:36.545495966Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-59cdf8fbb7-9krcc,Uid:a263530c-7958-441d-9c77-e0eaec1f0021,Namespace:calico-system,Attempt:0,}" May 13 06:55:36.712802 systemd-networkd[971]: cali58a87a89e22: Link UP May 13 06:55:36.716959 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 06:55:36.717053 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali58a87a89e22: link becomes ready May 13 06:55:36.716423 systemd-networkd[971]: cali58a87a89e22: Gained carrier May 13 06:55:36.737351 env[1155]: 2025-05-13 06:55:36.619 [INFO][5646] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--59cdf8fbb7--9krcc-eth0 calico-kube-controllers-59cdf8fbb7- calico-system a263530c-7958-441d-9c77-e0eaec1f0021 1119 0 2025-05-13 06:55:33 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:59cdf8fbb7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-7-n-7f05b50207.novalocal calico-kube-controllers-59cdf8fbb7-9krcc eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali58a87a89e22 [] []}} ContainerID="ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8" Namespace="calico-system" Pod="calico-kube-controllers-59cdf8fbb7-9krcc" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--59cdf8fbb7--9krcc-" May 13 06:55:36.737351 env[1155]: 2025-05-13 06:55:36.619 [INFO][5646] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8" Namespace="calico-system" Pod="calico-kube-controllers-59cdf8fbb7-9krcc" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--59cdf8fbb7--9krcc-eth0" May 13 06:55:36.737351 env[1155]: 2025-05-13 06:55:36.654 [INFO][5658] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8" HandleID="k8s-pod-network.ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--59cdf8fbb7--9krcc-eth0" May 13 06:55:36.737351 env[1155]: 2025-05-13 06:55:36.664 [INFO][5658] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8" HandleID="k8s-pod-network.ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--59cdf8fbb7--9krcc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000277010), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-7-n-7f05b50207.novalocal", "pod":"calico-kube-controllers-59cdf8fbb7-9krcc", "timestamp":"2025-05-13 06:55:36.654100147 +0000 UTC"}, Hostname:"ci-3510-3-7-n-7f05b50207.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 06:55:36.737351 env[1155]: 2025-05-13 06:55:36.664 [INFO][5658] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:55:36.737351 env[1155]: 2025-05-13 06:55:36.664 [INFO][5658] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:55:36.737351 env[1155]: 2025-05-13 06:55:36.664 [INFO][5658] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-7f05b50207.novalocal' May 13 06:55:36.737351 env[1155]: 2025-05-13 06:55:36.667 [INFO][5658] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:36.737351 env[1155]: 2025-05-13 06:55:36.672 [INFO][5658] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:36.737351 env[1155]: 2025-05-13 06:55:36.679 [INFO][5658] ipam/ipam.go 489: Trying affinity for 192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:36.737351 env[1155]: 2025-05-13 06:55:36.681 [INFO][5658] ipam/ipam.go 155: Attempting to load block cidr=192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:36.737351 env[1155]: 2025-05-13 06:55:36.684 [INFO][5658] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.0/26 host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:36.737351 env[1155]: 2025-05-13 06:55:36.684 [INFO][5658] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.0/26 handle="k8s-pod-network.ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:36.737351 env[1155]: 2025-05-13 06:55:36.688 [INFO][5658] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8 May 13 06:55:36.737351 env[1155]: 2025-05-13 06:55:36.694 [INFO][5658] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.20.0/26 handle="k8s-pod-network.ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:36.737351 env[1155]: 2025-05-13 06:55:36.706 [INFO][5658] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.20.9/26] block=192.168.20.0/26 handle="k8s-pod-network.ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:36.737351 env[1155]: 2025-05-13 06:55:36.706 [INFO][5658] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.9/26] handle="k8s-pod-network.ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8" host="ci-3510-3-7-n-7f05b50207.novalocal" May 13 06:55:36.737351 env[1155]: 2025-05-13 06:55:36.707 [INFO][5658] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:55:36.737351 env[1155]: 2025-05-13 06:55:36.707 [INFO][5658] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.20.9/26] IPv6=[] ContainerID="ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8" HandleID="k8s-pod-network.ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--59cdf8fbb7--9krcc-eth0" May 13 06:55:36.738122 env[1155]: 2025-05-13 06:55:36.708 [INFO][5646] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8" Namespace="calico-system" Pod="calico-kube-controllers-59cdf8fbb7-9krcc" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--59cdf8fbb7--9krcc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--59cdf8fbb7--9krcc-eth0", GenerateName:"calico-kube-controllers-59cdf8fbb7-", Namespace:"calico-system", SelfLink:"", UID:"a263530c-7958-441d-9c77-e0eaec1f0021", ResourceVersion:"1119", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 55, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"59cdf8fbb7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"", Pod:"calico-kube-controllers-59cdf8fbb7-9krcc", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.20.9/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali58a87a89e22", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:36.738122 env[1155]: 2025-05-13 06:55:36.708 [INFO][5646] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.20.9/32] ContainerID="ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8" Namespace="calico-system" Pod="calico-kube-controllers-59cdf8fbb7-9krcc" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--59cdf8fbb7--9krcc-eth0" May 13 06:55:36.738122 env[1155]: 2025-05-13 06:55:36.708 [INFO][5646] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali58a87a89e22 ContainerID="ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8" Namespace="calico-system" Pod="calico-kube-controllers-59cdf8fbb7-9krcc" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--59cdf8fbb7--9krcc-eth0" May 13 06:55:36.738122 env[1155]: 2025-05-13 06:55:36.717 [INFO][5646] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8" Namespace="calico-system" Pod="calico-kube-controllers-59cdf8fbb7-9krcc" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--59cdf8fbb7--9krcc-eth0" May 13 06:55:36.738122 env[1155]: 2025-05-13 06:55:36.717 [INFO][5646] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8" Namespace="calico-system" Pod="calico-kube-controllers-59cdf8fbb7-9krcc" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--59cdf8fbb7--9krcc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--59cdf8fbb7--9krcc-eth0", GenerateName:"calico-kube-controllers-59cdf8fbb7-", Namespace:"calico-system", SelfLink:"", UID:"a263530c-7958-441d-9c77-e0eaec1f0021", ResourceVersion:"1119", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 6, 55, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"59cdf8fbb7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-7f05b50207.novalocal", ContainerID:"ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8", Pod:"calico-kube-controllers-59cdf8fbb7-9krcc", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.20.9/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali58a87a89e22", MAC:"62:4d:fe:69:9c:38", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 06:55:36.738122 env[1155]: 2025-05-13 06:55:36.736 [INFO][5646] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8" Namespace="calico-system" Pod="calico-kube-controllers-59cdf8fbb7-9krcc" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--59cdf8fbb7--9krcc-eth0" May 13 06:55:36.752536 env[1155]: time="2025-05-13T06:55:36.752462972Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 06:55:36.752684 env[1155]: time="2025-05-13T06:55:36.752544990Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 06:55:36.752684 env[1155]: time="2025-05-13T06:55:36.752577768Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 06:55:36.752748 env[1155]: time="2025-05-13T06:55:36.752698695Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8 pid=5684 runtime=io.containerd.runc.v2 May 13 06:55:36.769276 systemd[1]: Started cri-containerd-ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8.scope. May 13 06:55:36.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.786000 audit: BPF prog-id=245 op=LOAD May 13 06:55:36.787000 audit[5694]: AVC avc: denied { bpf } for pid=5694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.787000 audit[5694]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5684 pid=5694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:36.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165343565636161356530663233363462343963643834313938333831 May 13 06:55:36.787000 audit[5694]: AVC avc: denied { perfmon } for pid=5694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.787000 audit[5694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5684 pid=5694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:36.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165343565636161356530663233363462343963643834313938333831 May 13 06:55:36.787000 audit[5694]: AVC avc: denied { bpf } for pid=5694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.787000 audit[5694]: AVC avc: denied { bpf } for pid=5694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.787000 audit[5694]: AVC avc: denied { bpf } for pid=5694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.787000 audit[5694]: AVC avc: denied { perfmon } for pid=5694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.787000 audit[5694]: AVC avc: denied { perfmon } for pid=5694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.787000 audit[5694]: AVC avc: denied { perfmon } for pid=5694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.787000 audit[5694]: AVC avc: denied { perfmon } for pid=5694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.787000 audit[5694]: AVC avc: denied { perfmon } for pid=5694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.787000 audit[5694]: AVC avc: denied { bpf } for pid=5694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.787000 audit[5694]: AVC avc: denied { bpf } for pid=5694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.787000 audit: BPF prog-id=246 op=LOAD May 13 06:55:36.787000 audit[5694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000330b30 items=0 ppid=5684 pid=5694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:36.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165343565636161356530663233363462343963643834313938333831 May 13 06:55:36.788000 audit[5694]: AVC avc: denied { bpf } for pid=5694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.788000 audit[5694]: AVC avc: denied { bpf } for pid=5694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.788000 audit[5694]: AVC avc: denied { perfmon } for pid=5694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.788000 audit[5694]: AVC avc: denied { perfmon } for pid=5694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.788000 audit[5694]: AVC avc: denied { perfmon } for pid=5694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.788000 audit[5694]: AVC avc: denied { perfmon } for pid=5694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.788000 audit[5694]: AVC avc: denied { perfmon } for pid=5694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.788000 audit[5694]: AVC avc: denied { bpf } for pid=5694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.788000 audit[5694]: AVC avc: denied { bpf } for pid=5694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.788000 audit: BPF prog-id=247 op=LOAD May 13 06:55:36.788000 audit[5694]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000330b78 items=0 ppid=5684 pid=5694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:36.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165343565636161356530663233363462343963643834313938333831 May 13 06:55:36.789000 audit: BPF prog-id=247 op=UNLOAD May 13 06:55:36.789000 audit: BPF prog-id=246 op=UNLOAD May 13 06:55:36.789000 audit[5694]: AVC avc: denied { bpf } for pid=5694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.789000 audit[5694]: AVC avc: denied { bpf } for pid=5694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.789000 audit[5694]: AVC avc: denied { bpf } for pid=5694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.789000 audit[5694]: AVC avc: denied { perfmon } for pid=5694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.789000 audit[5694]: AVC avc: denied { perfmon } for pid=5694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.789000 audit[5694]: AVC avc: denied { perfmon } for pid=5694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.789000 audit[5694]: AVC avc: denied { perfmon } for pid=5694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.789000 audit[5694]: AVC avc: denied { perfmon } for pid=5694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.789000 audit[5694]: AVC avc: denied { bpf } for pid=5694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.789000 audit[5694]: AVC avc: denied { bpf } for pid=5694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.789000 audit: BPF prog-id=248 op=LOAD May 13 06:55:36.789000 audit[5694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000330f88 items=0 ppid=5684 pid=5694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:36.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165343565636161356530663233363462343963643834313938333831 May 13 06:55:36.816816 env[1155]: time="2025-05-13T06:55:36.816770589Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-59cdf8fbb7-9krcc,Uid:a263530c-7958-441d-9c77-e0eaec1f0021,Namespace:calico-system,Attempt:0,} returns sandbox id \"ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8\"" May 13 06:55:36.828035 env[1155]: time="2025-05-13T06:55:36.827978157Z" level=info msg="CreateContainer within sandbox \"ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 13 06:55:36.844042 env[1155]: time="2025-05-13T06:55:36.843988842Z" level=info msg="CreateContainer within sandbox \"ae45ecaa5e0f2364b49cd841983817d961fbaafb4545db3119e86465d93901b8\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"77c826a179699678c835a374be396d626293f654860c5d49017b345319e79d84\"" May 13 06:55:36.846050 env[1155]: time="2025-05-13T06:55:36.846015779Z" level=info msg="StartContainer for \"77c826a179699678c835a374be396d626293f654860c5d49017b345319e79d84\"" May 13 06:55:36.862500 systemd[1]: Started cri-containerd-77c826a179699678c835a374be396d626293f654860c5d49017b345319e79d84.scope. May 13 06:55:36.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit: BPF prog-id=249 op=LOAD May 13 06:55:36.879000 audit[5725]: AVC avc: denied { bpf } for pid=5725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5684 pid=5725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:36.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737633832366131373936393936373863383335613337346265333936 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { perfmon } for pid=5725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=5684 pid=5725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:36.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737633832366131373936393936373863383335613337346265333936 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { bpf } for pid=5725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { bpf } for pid=5725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { bpf } for pid=5725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { perfmon } for pid=5725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { perfmon } for pid=5725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { perfmon } for pid=5725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { perfmon } for pid=5725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { perfmon } for pid=5725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { bpf } for pid=5725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { bpf } for pid=5725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit: BPF prog-id=250 op=LOAD May 13 06:55:36.879000 audit[5725]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002d3d10 items=0 ppid=5684 pid=5725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:36.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737633832366131373936393936373863383335613337346265333936 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { bpf } for pid=5725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { bpf } for pid=5725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { perfmon } for pid=5725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { perfmon } for pid=5725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { perfmon } for pid=5725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { perfmon } for pid=5725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { perfmon } for pid=5725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { bpf } for pid=5725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { bpf } for pid=5725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit: BPF prog-id=251 op=LOAD May 13 06:55:36.879000 audit[5725]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002d3d58 items=0 ppid=5684 pid=5725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:36.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737633832366131373936393936373863383335613337346265333936 May 13 06:55:36.879000 audit: BPF prog-id=251 op=UNLOAD May 13 06:55:36.879000 audit: BPF prog-id=250 op=UNLOAD May 13 06:55:36.879000 audit[5725]: AVC avc: denied { bpf } for pid=5725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { bpf } for pid=5725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { bpf } for pid=5725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { perfmon } for pid=5725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { perfmon } for pid=5725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { perfmon } for pid=5725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { perfmon } for pid=5725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { perfmon } for pid=5725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { bpf } for pid=5725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit[5725]: AVC avc: denied { bpf } for pid=5725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:36.879000 audit: BPF prog-id=252 op=LOAD May 13 06:55:36.879000 audit[5725]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000364168 items=0 ppid=5684 pid=5725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:36.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737633832366131373936393936373863383335613337346265333936 May 13 06:55:36.910630 env[1155]: time="2025-05-13T06:55:36.910583392Z" level=info msg="StartContainer for \"77c826a179699678c835a374be396d626293f654860c5d49017b345319e79d84\" returns successfully" May 13 06:55:36.970635 kubelet[1935]: I0513 06:55:36.966292 1935 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-6d58f5ddb8-zpxfk" podStartSLOduration=4.966275461 podStartE2EDuration="4.966275461s" podCreationTimestamp="2025-05-13 06:55:32 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 06:55:36.965550811 +0000 UTC m=+78.892928204" watchObservedRunningTime="2025-05-13 06:55:36.966275461 +0000 UTC m=+78.893652854" May 13 06:55:36.982333 systemd[1]: run-containerd-runc-k8s.io-d10c6ca480ef1b90e96f35f701895afcc8e95210bedd37648a0403a4986d45d1-runc.RQwl3M.mount: Deactivated successfully. May 13 06:55:37.056692 kubelet[1935]: I0513 06:55:37.056617 1935 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-mjm6h" podStartSLOduration=4.05659891 podStartE2EDuration="4.05659891s" podCreationTimestamp="2025-05-13 06:55:33 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 06:55:37.032751605 +0000 UTC m=+78.960129008" watchObservedRunningTime="2025-05-13 06:55:37.05659891 +0000 UTC m=+78.983976313" May 13 06:55:37.064000 audit[5785]: NETFILTER_CFG table=filter:136 family=2 entries=9 op=nft_register_rule pid=5785 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:37.064000 audit[5785]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe4d672150 a2=0 a3=7ffe4d67213c items=0 ppid=2110 pid=5785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:37.064000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:37.071000 audit[5785]: NETFILTER_CFG table=nat:137 family=2 entries=27 op=nft_register_chain pid=5785 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:37.071000 audit[5785]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe4d672150 a2=0 a3=7ffe4d67213c items=0 ppid=2110 pid=5785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:37.071000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:37.567000 audit[5842]: AVC avc: denied { write } for pid=5842 comm="tee" name="fd" dev="proc" ino=35159 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 06:55:37.567000 audit[5842]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffae9dc9f4 a2=241 a3=1b6 items=1 ppid=5807 pid=5842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:37.567000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 13 06:55:37.567000 audit: PATH item=0 name="/dev/fd/63" inode=34330 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:55:37.567000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 06:55:37.572000 audit[5845]: AVC avc: denied { write } for pid=5845 comm="tee" name="fd" dev="proc" ino=35165 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 06:55:37.572000 audit[5845]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdeacde9f4 a2=241 a3=1b6 items=1 ppid=5812 pid=5845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:37.572000 audit: CWD cwd="/etc/service/enabled/felix/log" May 13 06:55:37.572000 audit: PATH item=0 name="/dev/fd/63" inode=34337 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:55:37.572000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 06:55:37.586000 kernel: kauditd_printk_skb: 450 callbacks suppressed May 13 06:55:37.586151 kernel: audit: type=1400 audit(1747119337.579:1508): avc: denied { write } for pid=5850 comm="tee" name="fd" dev="proc" ino=35169 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 06:55:37.579000 audit[5850]: AVC avc: denied { write } for pid=5850 comm="tee" name="fd" dev="proc" ino=35169 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 06:55:37.592586 kernel: audit: type=1300 audit(1747119337.579:1508): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee82e29e5 a2=241 a3=1b6 items=1 ppid=5804 pid=5850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:37.579000 audit[5850]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee82e29e5 a2=241 a3=1b6 items=1 ppid=5804 pid=5850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:37.579000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 13 06:55:37.599941 kernel: audit: type=1307 audit(1747119337.579:1508): cwd="/etc/service/enabled/node-status-reporter/log" May 13 06:55:37.579000 audit: PATH item=0 name="/dev/fd/63" inode=34338 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:55:37.604948 kernel: audit: type=1302 audit(1747119337.579:1508): item=0 name="/dev/fd/63" inode=34338 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:55:37.579000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 06:55:37.580000 audit[5852]: AVC avc: denied { write } for pid=5852 comm="tee" name="fd" dev="proc" ino=35173 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 06:55:37.615943 kernel: audit: type=1327 audit(1747119337.579:1508): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 06:55:37.616040 kernel: audit: type=1400 audit(1747119337.580:1509): avc: denied { write } for pid=5852 comm="tee" name="fd" dev="proc" ino=35173 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 06:55:37.616068 kernel: audit: type=1300 audit(1747119337.580:1509): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffca35d19f6 a2=241 a3=1b6 items=1 ppid=5811 pid=5852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:37.580000 audit[5852]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffca35d19f6 a2=241 a3=1b6 items=1 ppid=5811 pid=5852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:37.580000 audit: CWD cwd="/etc/service/enabled/cni/log" May 13 06:55:37.624879 kernel: audit: type=1307 audit(1747119337.580:1509): cwd="/etc/service/enabled/cni/log" May 13 06:55:37.624959 kernel: audit: type=1302 audit(1747119337.580:1509): item=0 name="/dev/fd/63" inode=34339 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:55:37.580000 audit: PATH item=0 name="/dev/fd/63" inode=34339 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:55:37.580000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 06:55:37.637978 kernel: audit: type=1327 audit(1747119337.580:1509): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 06:55:37.581000 audit[5854]: AVC avc: denied { write } for pid=5854 comm="tee" name="fd" dev="proc" ino=35177 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 06:55:37.581000 audit[5854]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffd66109f5 a2=241 a3=1b6 items=1 ppid=5806 pid=5854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:37.581000 audit: CWD cwd="/etc/service/enabled/bird/log" May 13 06:55:37.581000 audit: PATH item=0 name="/dev/fd/63" inode=34342 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:55:37.581000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 06:55:37.595000 audit[5862]: AVC avc: denied { write } for pid=5862 comm="tee" name="fd" dev="proc" ino=35182 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 06:55:37.595000 audit[5862]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff827539e4 a2=241 a3=1b6 items=1 ppid=5816 pid=5862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:37.595000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 13 06:55:37.595000 audit: PATH item=0 name="/dev/fd/63" inode=34347 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:55:37.595000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 06:55:37.610000 audit[5867]: AVC avc: denied { write } for pid=5867 comm="tee" name="fd" dev="proc" ino=34358 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 06:55:37.610000 audit[5867]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd2e9b99f4 a2=241 a3=1b6 items=1 ppid=5815 pid=5867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:37.610000 audit: CWD cwd="/etc/service/enabled/confd/log" May 13 06:55:37.610000 audit: PATH item=0 name="/dev/fd/63" inode=34350 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 06:55:37.610000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 06:55:37.854000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.854000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.854000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.854000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.854000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.854000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.854000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.854000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.854000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.854000 audit: BPF prog-id=253 op=LOAD May 13 06:55:37.854000 audit[5915]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe5e696810 a2=98 a3=3 items=0 ppid=5813 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:37.854000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:37.856000 audit: BPF prog-id=253 op=UNLOAD May 13 06:55:37.857000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.857000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.857000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.857000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.857000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.857000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.857000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.857000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.857000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.857000 audit: BPF prog-id=254 op=LOAD May 13 06:55:37.857000 audit[5915]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe5e6965f0 a2=74 a3=540051 items=0 ppid=5813 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:37.857000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:37.857000 audit: BPF prog-id=254 op=UNLOAD May 13 06:55:37.857000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.857000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.857000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.857000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.857000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.857000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.857000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.857000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.857000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:37.857000 audit: BPF prog-id=255 op=LOAD May 13 06:55:37.857000 audit[5915]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe5e696620 a2=94 a3=2 items=0 ppid=5813 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:37.857000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:37.858000 audit: BPF prog-id=255 op=UNLOAD May 13 06:55:37.939074 systemd[1]: run-containerd-runc-k8s.io-77c826a179699678c835a374be396d626293f654860c5d49017b345319e79d84-runc.61ULA9.mount: Deactivated successfully. May 13 06:55:37.982473 systemd[1]: run-containerd-runc-k8s.io-d10c6ca480ef1b90e96f35f701895afcc8e95210bedd37648a0403a4986d45d1-runc.Mpb7hT.mount: Deactivated successfully. May 13 06:55:38.000366 systemd[1]: run-containerd-runc-k8s.io-77c826a179699678c835a374be396d626293f654860c5d49017b345319e79d84-runc.sRpKea.mount: Deactivated successfully. May 13 06:55:38.027000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.027000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.027000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.027000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.027000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.027000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.027000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.027000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.027000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.027000 audit: BPF prog-id=256 op=LOAD May 13 06:55:38.027000 audit[5915]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe5e6964e0 a2=40 a3=1 items=0 ppid=5813 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.027000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:38.027000 audit: BPF prog-id=256 op=UNLOAD May 13 06:55:38.027000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.027000 audit[5915]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe5e6965b0 a2=50 a3=7ffe5e696690 items=0 ppid=5813 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.027000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:38.037000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.037000 audit[5915]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe5e6964f0 a2=28 a3=0 items=0 ppid=5813 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:38.037000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.037000 audit[5915]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe5e696520 a2=28 a3=0 items=0 ppid=5813 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:38.037000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.037000 audit[5915]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe5e696430 a2=28 a3=0 items=0 ppid=5813 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:38.037000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.037000 audit[5915]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe5e696540 a2=28 a3=0 items=0 ppid=5813 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:38.037000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.037000 audit[5915]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe5e696520 a2=28 a3=0 items=0 ppid=5813 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:38.037000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.037000 audit[5915]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe5e696510 a2=28 a3=0 items=0 ppid=5813 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:38.037000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.037000 audit[5915]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe5e696540 a2=28 a3=0 items=0 ppid=5813 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:38.037000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.037000 audit[5915]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe5e696520 a2=28 a3=0 items=0 ppid=5813 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:38.037000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.037000 audit[5915]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe5e696540 a2=28 a3=0 items=0 ppid=5813 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:38.037000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.037000 audit[5915]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe5e696510 a2=28 a3=0 items=0 ppid=5813 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:38.037000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.037000 audit[5915]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe5e696580 a2=28 a3=0 items=0 ppid=5813 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:38.037000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.037000 audit[5915]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe5e696330 a2=50 a3=1 items=0 ppid=5813 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:38.037000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.037000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.037000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.037000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.037000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.037000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.037000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.037000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.037000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.037000 audit: BPF prog-id=257 op=LOAD May 13 06:55:38.037000 audit[5915]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe5e696330 a2=94 a3=5 items=0 ppid=5813 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:38.040000 audit: BPF prog-id=257 op=UNLOAD May 13 06:55:38.040000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.040000 audit[5915]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe5e6963e0 a2=50 a3=1 items=0 ppid=5813 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.040000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:38.040000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.040000 audit[5915]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe5e696500 a2=4 a3=38 items=0 ppid=5813 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.040000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:38.040000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.040000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.040000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.040000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.040000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.040000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.040000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.040000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.040000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.040000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.040000 audit[5915]: AVC avc: denied { confidentiality } for pid=5915 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 06:55:38.040000 audit[5915]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe5e696550 a2=94 a3=6 items=0 ppid=5813 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.040000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:38.041000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.041000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.041000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.041000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.041000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.041000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.041000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.041000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.041000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.041000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.041000 audit[5915]: AVC avc: denied { confidentiality } for pid=5915 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 06:55:38.041000 audit[5915]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe5e695d00 a2=94 a3=83 items=0 ppid=5813 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.041000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:38.042000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.042000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.042000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.042000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.042000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.042000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.042000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.042000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.042000 audit[5915]: AVC avc: denied { perfmon } for pid=5915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.042000 audit[5915]: AVC avc: denied { bpf } for pid=5915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.042000 audit[5915]: AVC avc: denied { confidentiality } for pid=5915 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 06:55:38.042000 audit[5915]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe5e695d00 a2=94 a3=83 items=0 ppid=5813 pid=5915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.042000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 06:55:38.065000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.065000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.065000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.065000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.065000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.065000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.065000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.065000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.065000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.065000 audit: BPF prog-id=258 op=LOAD May 13 06:55:38.065000 audit[5958]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd5125600 a2=98 a3=1999999999999999 items=0 ppid=5813 pid=5958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.065000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 06:55:38.066000 audit: BPF prog-id=258 op=UNLOAD May 13 06:55:38.066000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.066000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.066000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.066000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.066000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.066000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.066000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.066000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.066000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.066000 audit: BPF prog-id=259 op=LOAD May 13 06:55:38.066000 audit[5958]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd51254e0 a2=74 a3=ffff items=0 ppid=5813 pid=5958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.066000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 06:55:38.066000 audit: BPF prog-id=259 op=UNLOAD May 13 06:55:38.066000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.066000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.066000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.066000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.066000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.066000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.066000 audit[5958]: AVC avc: denied { perfmon } for pid=5958 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.066000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.066000 audit[5958]: AVC avc: denied { bpf } for pid=5958 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.066000 audit: BPF prog-id=260 op=LOAD May 13 06:55:38.066000 audit[5958]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd5125520 a2=40 a3=7fffd5125700 items=0 ppid=5813 pid=5958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.066000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 06:55:38.067000 audit: BPF prog-id=260 op=UNLOAD May 13 06:55:38.160000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit: BPF prog-id=261 op=LOAD May 13 06:55:38.160000 audit[5987]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff9b80c250 a2=98 a3=100 items=0 ppid=5813 pid=5987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:38.160000 audit: BPF prog-id=261 op=UNLOAD May 13 06:55:38.160000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit: BPF prog-id=262 op=LOAD May 13 06:55:38.160000 audit[5987]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff9b80c060 a2=74 a3=540051 items=0 ppid=5813 pid=5987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:38.160000 audit: BPF prog-id=262 op=UNLOAD May 13 06:55:38.160000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit: BPF prog-id=263 op=LOAD May 13 06:55:38.160000 audit[5987]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff9b80c090 a2=94 a3=2 items=0 ppid=5813 pid=5987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:38.160000 audit: BPF prog-id=263 op=UNLOAD May 13 06:55:38.160000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff9b80bf60 a2=28 a3=0 items=0 ppid=5813 pid=5987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9b80bf90 a2=28 a3=0 items=0 ppid=5813 pid=5987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9b80bea0 a2=28 a3=0 items=0 ppid=5813 pid=5987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff9b80bfb0 a2=28 a3=0 items=0 ppid=5813 pid=5987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff9b80bf90 a2=28 a3=0 items=0 ppid=5813 pid=5987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:38.160000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.160000 audit[5987]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff9b80bf80 a2=28 a3=0 items=0 ppid=5813 pid=5987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff9b80bfb0 a2=28 a3=0 items=0 ppid=5813 pid=5987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.164000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9b80bf90 a2=28 a3=0 items=0 ppid=5813 pid=5987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.164000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9b80bfb0 a2=28 a3=0 items=0 ppid=5813 pid=5987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.164000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9b80bf80 a2=28 a3=0 items=0 ppid=5813 pid=5987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.164000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff9b80bff0 a2=28 a3=0 items=0 ppid=5813 pid=5987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.164000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit: BPF prog-id=264 op=LOAD May 13 06:55:38.164000 audit[5987]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff9b80be60 a2=40 a3=0 items=0 ppid=5813 pid=5987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.164000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:38.164000 audit: BPF prog-id=264 op=UNLOAD May 13 06:55:38.164000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff9b80be50 a2=50 a3=2800 items=0 ppid=5813 pid=5987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.164000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff9b80be50 a2=50 a3=2800 items=0 ppid=5813 pid=5987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.164000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit: BPF prog-id=265 op=LOAD May 13 06:55:38.164000 audit[5987]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff9b80b670 a2=94 a3=2 items=0 ppid=5813 pid=5987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.164000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:38.164000 audit: BPF prog-id=265 op=UNLOAD May 13 06:55:38.164000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.164000 audit: BPF prog-id=266 op=LOAD May 13 06:55:38.164000 audit[5987]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff9b80b770 a2=94 a3=30 items=0 ppid=5813 pid=5987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.164000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 06:55:38.171000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.171000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.171000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.171000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.171000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.171000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.171000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.171000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.171000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.171000 audit: BPF prog-id=267 op=LOAD May 13 06:55:38.171000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb9fde8d0 a2=98 a3=0 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.171000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.171000 audit: BPF prog-id=267 op=UNLOAD May 13 06:55:38.172000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.172000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.172000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.172000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.172000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.172000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.172000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.172000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.172000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.172000 audit: BPF prog-id=268 op=LOAD May 13 06:55:38.172000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffb9fde6b0 a2=74 a3=540051 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.172000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.172000 audit: BPF prog-id=268 op=UNLOAD May 13 06:55:38.172000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.172000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.172000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.172000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.172000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.172000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.172000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.172000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.172000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.172000 audit: BPF prog-id=269 op=LOAD May 13 06:55:38.172000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffb9fde6e0 a2=94 a3=2 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.172000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.172000 audit: BPF prog-id=269 op=UNLOAD May 13 06:55:38.292000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.292000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.292000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.292000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.292000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.292000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.292000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.292000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.292000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.292000 audit: BPF prog-id=270 op=LOAD May 13 06:55:38.292000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffb9fde5a0 a2=40 a3=1 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.292000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.292000 audit: BPF prog-id=270 op=UNLOAD May 13 06:55:38.292000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.292000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffb9fde670 a2=50 a3=7fffb9fde750 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.292000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.296952 systemd-networkd[971]: cali58a87a89e22: Gained IPv6LL May 13 06:55:38.301000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.301000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb9fde5b0 a2=28 a3=0 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.301000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.301000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.301000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb9fde5e0 a2=28 a3=0 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.301000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.301000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.301000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb9fde4f0 a2=28 a3=0 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.301000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.301000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.301000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb9fde600 a2=28 a3=0 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.301000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.301000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.301000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb9fde5e0 a2=28 a3=0 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.301000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.301000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.301000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb9fde5d0 a2=28 a3=0 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.301000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.301000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.301000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb9fde600 a2=28 a3=0 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.301000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.301000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.301000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb9fde5e0 a2=28 a3=0 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.301000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.301000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.301000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb9fde600 a2=28 a3=0 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.301000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.301000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.301000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb9fde5d0 a2=28 a3=0 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.301000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.302000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.302000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffb9fde640 a2=28 a3=0 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.302000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.302000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.302000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffb9fde3f0 a2=50 a3=1 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.302000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.302000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.302000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.302000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.302000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.302000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.302000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.302000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.302000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.302000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.302000 audit: BPF prog-id=271 op=LOAD May 13 06:55:38.302000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffb9fde3f0 a2=94 a3=5 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.302000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.302000 audit: BPF prog-id=271 op=UNLOAD May 13 06:55:38.302000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.302000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffb9fde4a0 a2=50 a3=1 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.302000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.307000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.307000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffb9fde5c0 a2=4 a3=38 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.307000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.307000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.307000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.307000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.307000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.307000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.307000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.307000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.307000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.307000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.307000 audit[5989]: AVC avc: denied { confidentiality } for pid=5989 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 06:55:38.307000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffb9fde610 a2=94 a3=6 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.308000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.308000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.308000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.308000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.308000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.308000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.308000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.308000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.308000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.308000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.308000 audit[5989]: AVC avc: denied { confidentiality } for pid=5989 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 06:55:38.308000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffb9fdddc0 a2=94 a3=83 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.309000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.309000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.309000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.309000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.309000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.309000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.309000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.309000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.309000 audit[5989]: AVC avc: denied { perfmon } for pid=5989 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.309000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.309000 audit[5989]: AVC avc: denied { confidentiality } for pid=5989 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 06:55:38.309000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffb9fdddc0 a2=94 a3=83 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.309000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.310000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.310000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffb9fdf800 a2=10 a3=f0f1 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.310000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.311000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.311000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffb9fdf6a0 a2=10 a3=3 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.311000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.311000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.311000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffb9fdf640 a2=10 a3=3 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.311000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.311000 audit[5989]: AVC avc: denied { bpf } for pid=5989 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 06:55:38.311000 audit[5989]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffb9fdf640 a2=10 a3=7 items=0 ppid=5813 pid=5989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.311000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 06:55:38.332000 audit: BPF prog-id=266 op=UNLOAD May 13 06:55:38.407000 audit[6020]: NETFILTER_CFG table=filter:138 family=2 entries=68 op=nft_register_chain pid=6020 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 06:55:38.407000 audit[6020]: SYSCALL arch=c000003e syscall=46 success=yes exit=23840 a0=3 a1=7ffff9d50b40 a2=0 a3=7ffff9d50b2c items=0 ppid=5813 pid=6020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.407000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 06:55:38.408000 audit[6020]: NETFILTER_CFG table=filter:139 family=2 entries=2 op=nft_unregister_chain pid=6020 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 06:55:38.408000 audit[6020]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffff9d50b40 a2=0 a3=2d77742d696c6163 items=0 ppid=5813 pid=6020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:38.408000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 06:55:38.999328 systemd[1]: run-containerd-runc-k8s.io-77c826a179699678c835a374be396d626293f654860c5d49017b345319e79d84-runc.BfatQ0.mount: Deactivated successfully. May 13 06:55:41.032313 kubelet[1935]: I0513 06:55:41.032261 1935 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 06:55:41.088052 kubelet[1935]: I0513 06:55:41.087886 1935 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-59cdf8fbb7-9krcc" podStartSLOduration=8.087854416 podStartE2EDuration="8.087854416s" podCreationTimestamp="2025-05-13 06:55:33 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 06:55:37.057572349 +0000 UTC m=+78.984949762" watchObservedRunningTime="2025-05-13 06:55:41.087854416 +0000 UTC m=+83.015231859" May 13 06:55:41.139000 audit[6052]: NETFILTER_CFG table=filter:140 family=2 entries=8 op=nft_register_rule pid=6052 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:41.139000 audit[6052]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff1f514cd0 a2=0 a3=7fff1f514cbc items=0 ppid=2110 pid=6052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:41.139000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:55:41.145000 audit[6052]: NETFILTER_CFG table=nat:141 family=2 entries=34 op=nft_register_chain pid=6052 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:55:41.145000 audit[6052]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff1f514cd0 a2=0 a3=7fff1f514cbc items=0 ppid=2110 pid=6052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:55:41.145000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:56:03.112639 kubelet[1935]: I0513 06:56:03.112598 1935 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 06:56:03.194763 kernel: kauditd_printk_skb: 495 callbacks suppressed May 13 06:56:03.194866 kernel: audit: type=1325 audit(1747119363.188:1608): table=filter:142 family=2 entries=8 op=nft_register_rule pid=6082 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:56:03.188000 audit[6082]: NETFILTER_CFG table=filter:142 family=2 entries=8 op=nft_register_rule pid=6082 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:56:03.188000 audit[6082]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff6cd288f0 a2=0 a3=7fff6cd288dc items=0 ppid=2110 pid=6082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:56:03.188000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:56:03.209601 kernel: audit: type=1300 audit(1747119363.188:1608): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff6cd288f0 a2=0 a3=7fff6cd288dc items=0 ppid=2110 pid=6082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:56:03.209727 kernel: audit: type=1327 audit(1747119363.188:1608): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:56:03.198000 audit[6082]: NETFILTER_CFG table=nat:143 family=2 entries=40 op=nft_register_chain pid=6082 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:56:03.215828 env[1155]: time="2025-05-13T06:56:03.215763711Z" level=info msg="StopContainer for \"cd00a0ba1675bbecb0b304fddeb10f2520129f67626abb471440901a5aa2737d\" with timeout 30 (s)" May 13 06:56:03.216216 kernel: audit: type=1325 audit(1747119363.198:1609): table=nat:143 family=2 entries=40 op=nft_register_chain pid=6082 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:56:03.216535 env[1155]: time="2025-05-13T06:56:03.216482859Z" level=info msg="Stop container \"cd00a0ba1675bbecb0b304fddeb10f2520129f67626abb471440901a5aa2737d\" with signal terminated" May 13 06:56:03.198000 audit[6082]: SYSCALL arch=c000003e syscall=46 success=yes exit=13124 a0=3 a1=7fff6cd288f0 a2=0 a3=7fff6cd288dc items=0 ppid=2110 pid=6082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:56:03.231949 kernel: audit: type=1300 audit(1747119363.198:1609): arch=c000003e syscall=46 success=yes exit=13124 a0=3 a1=7fff6cd288f0 a2=0 a3=7fff6cd288dc items=0 ppid=2110 pid=6082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:56:03.198000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:56:03.236959 kernel: audit: type=1327 audit(1747119363.198:1609): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:56:03.254000 audit: BPF prog-id=212 op=UNLOAD May 13 06:56:03.254736 systemd[1]: cri-containerd-cd00a0ba1675bbecb0b304fddeb10f2520129f67626abb471440901a5aa2737d.scope: Deactivated successfully. May 13 06:56:03.257954 kernel: audit: type=1334 audit(1747119363.254:1610): prog-id=212 op=UNLOAD May 13 06:56:03.259000 audit: BPF prog-id=215 op=UNLOAD May 13 06:56:03.262956 kernel: audit: type=1334 audit(1747119363.259:1611): prog-id=215 op=UNLOAD May 13 06:56:03.287271 kernel: audit: type=1325 audit(1747119363.279:1612): table=filter:144 family=2 entries=8 op=nft_register_rule pid=6103 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:56:03.287361 kernel: audit: type=1300 audit(1747119363.279:1612): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe45ba5b10 a2=0 a3=7ffe45ba5afc items=0 ppid=2110 pid=6103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:56:03.279000 audit[6103]: NETFILTER_CFG table=filter:144 family=2 entries=8 op=nft_register_rule pid=6103 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:56:03.279000 audit[6103]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe45ba5b10 a2=0 a3=7ffe45ba5afc items=0 ppid=2110 pid=6103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:56:03.286378 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-cd00a0ba1675bbecb0b304fddeb10f2520129f67626abb471440901a5aa2737d-rootfs.mount: Deactivated successfully. May 13 06:56:03.279000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:56:03.296000 audit[6103]: NETFILTER_CFG table=nat:145 family=2 entries=40 op=nft_unregister_chain pid=6103 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:56:03.296000 audit[6103]: SYSCALL arch=c000003e syscall=46 success=yes exit=11364 a0=3 a1=7ffe45ba5b10 a2=0 a3=7ffe45ba5afc items=0 ppid=2110 pid=6103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:56:03.296000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:56:03.337904 env[1155]: time="2025-05-13T06:56:03.337828780Z" level=info msg="shim disconnected" id=cd00a0ba1675bbecb0b304fddeb10f2520129f67626abb471440901a5aa2737d May 13 06:56:03.337904 env[1155]: time="2025-05-13T06:56:03.337898457Z" level=warning msg="cleaning up after shim disconnected" id=cd00a0ba1675bbecb0b304fddeb10f2520129f67626abb471440901a5aa2737d namespace=k8s.io May 13 06:56:03.338230 env[1155]: time="2025-05-13T06:56:03.337931759Z" level=info msg="cleaning up dead shim" May 13 06:56:03.352903 env[1155]: time="2025-05-13T06:56:03.352859227Z" level=warning msg="cleanup warnings time=\"2025-05-13T06:56:03Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6104 runtime=io.containerd.runc.v2\n" May 13 06:56:03.357228 env[1155]: time="2025-05-13T06:56:03.357189314Z" level=info msg="StopContainer for \"cd00a0ba1675bbecb0b304fddeb10f2520129f67626abb471440901a5aa2737d\" returns successfully" May 13 06:56:03.358019 env[1155]: time="2025-05-13T06:56:03.357985533Z" level=info msg="StopPodSandbox for \"d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362\"" May 13 06:56:03.358182 env[1155]: time="2025-05-13T06:56:03.358157538Z" level=info msg="Container to stop \"cd00a0ba1675bbecb0b304fddeb10f2520129f67626abb471440901a5aa2737d\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 13 06:56:03.363235 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362-shm.mount: Deactivated successfully. May 13 06:56:03.375665 systemd[1]: cri-containerd-d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362.scope: Deactivated successfully. May 13 06:56:03.375000 audit: BPF prog-id=185 op=UNLOAD May 13 06:56:03.379000 audit: BPF prog-id=188 op=UNLOAD May 13 06:56:03.421538 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362-rootfs.mount: Deactivated successfully. May 13 06:56:03.430348 env[1155]: time="2025-05-13T06:56:03.430304428Z" level=info msg="shim disconnected" id=d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362 May 13 06:56:03.430604 env[1155]: time="2025-05-13T06:56:03.430584311Z" level=warning msg="cleaning up after shim disconnected" id=d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362 namespace=k8s.io May 13 06:56:03.430703 env[1155]: time="2025-05-13T06:56:03.430687160Z" level=info msg="cleaning up dead shim" May 13 06:56:03.441659 env[1155]: time="2025-05-13T06:56:03.441618464Z" level=warning msg="cleanup warnings time=\"2025-05-13T06:56:03Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6136 runtime=io.containerd.runc.v2\n" May 13 06:56:03.497206 systemd-networkd[971]: calif9d730fd425: Link DOWN May 13 06:56:03.497213 systemd-networkd[971]: calif9d730fd425: Lost carrier May 13 06:56:03.529000 audit[6181]: NETFILTER_CFG table=filter:146 family=2 entries=40 op=nft_register_rule pid=6181 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 06:56:03.529000 audit[6181]: SYSCALL arch=c000003e syscall=46 success=yes exit=5364 a0=3 a1=7fff45af0740 a2=0 a3=7fff45af072c items=0 ppid=5813 pid=6181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:56:03.529000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 06:56:03.530000 audit[6181]: NETFILTER_CFG table=filter:147 family=2 entries=2 op=nft_unregister_chain pid=6181 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 06:56:03.530000 audit[6181]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff45af0740 a2=0 a3=2d77662d696c6163 items=0 ppid=5813 pid=6181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:56:03.530000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 06:56:03.622828 env[1155]: 2025-05-13 06:56:03.496 [INFO][6164] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" May 13 06:56:03.622828 env[1155]: 2025-05-13 06:56:03.496 [INFO][6164] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" iface="eth0" netns="/var/run/netns/cni-0bb87085-aff7-3814-53e1-4781c44728cc" May 13 06:56:03.622828 env[1155]: 2025-05-13 06:56:03.496 [INFO][6164] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" iface="eth0" netns="/var/run/netns/cni-0bb87085-aff7-3814-53e1-4781c44728cc" May 13 06:56:03.622828 env[1155]: 2025-05-13 06:56:03.517 [INFO][6164] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" after=20.850094ms iface="eth0" netns="/var/run/netns/cni-0bb87085-aff7-3814-53e1-4781c44728cc" May 13 06:56:03.622828 env[1155]: 2025-05-13 06:56:03.517 [INFO][6164] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" May 13 06:56:03.622828 env[1155]: 2025-05-13 06:56:03.517 [INFO][6164] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" May 13 06:56:03.622828 env[1155]: 2025-05-13 06:56:03.555 [INFO][6177] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" HandleID="k8s-pod-network.d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:56:03.622828 env[1155]: 2025-05-13 06:56:03.555 [INFO][6177] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:56:03.622828 env[1155]: 2025-05-13 06:56:03.555 [INFO][6177] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:56:03.622828 env[1155]: 2025-05-13 06:56:03.609 [INFO][6177] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" HandleID="k8s-pod-network.d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:56:03.622828 env[1155]: 2025-05-13 06:56:03.609 [INFO][6177] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" HandleID="k8s-pod-network.d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:56:03.622828 env[1155]: 2025-05-13 06:56:03.611 [INFO][6177] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:56:03.622828 env[1155]: 2025-05-13 06:56:03.613 [INFO][6164] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" May 13 06:56:03.622828 env[1155]: time="2025-05-13T06:56:03.619999630Z" level=info msg="TearDown network for sandbox \"d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362\" successfully" May 13 06:56:03.622828 env[1155]: time="2025-05-13T06:56:03.620057465Z" level=info msg="StopPodSandbox for \"d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362\" returns successfully" May 13 06:56:03.620319 systemd[1]: run-netns-cni\x2d0bb87085\x2daff7\x2d3814\x2d53e1\x2d4781c44728cc.mount: Deactivated successfully. May 13 06:56:03.700614 kubelet[1935]: I0513 06:56:03.700051 1935 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-nt462\" (UniqueName: \"kubernetes.io/projected/7dd504f7-f59c-4f56-83ca-cfbb5256e7fc-kube-api-access-nt462\") pod \"7dd504f7-f59c-4f56-83ca-cfbb5256e7fc\" (UID: \"7dd504f7-f59c-4f56-83ca-cfbb5256e7fc\") " May 13 06:56:03.700614 kubelet[1935]: I0513 06:56:03.700106 1935 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/7dd504f7-f59c-4f56-83ca-cfbb5256e7fc-calico-apiserver-certs\") pod \"7dd504f7-f59c-4f56-83ca-cfbb5256e7fc\" (UID: \"7dd504f7-f59c-4f56-83ca-cfbb5256e7fc\") " May 13 06:56:03.707616 systemd[1]: var-lib-kubelet-pods-7dd504f7\x2df59c\x2d4f56\x2d83ca\x2dcfbb5256e7fc-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. May 13 06:56:03.710087 kubelet[1935]: I0513 06:56:03.710054 1935 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/7dd504f7-f59c-4f56-83ca-cfbb5256e7fc-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "7dd504f7-f59c-4f56-83ca-cfbb5256e7fc" (UID: "7dd504f7-f59c-4f56-83ca-cfbb5256e7fc"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 13 06:56:03.711362 kubelet[1935]: I0513 06:56:03.711340 1935 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/7dd504f7-f59c-4f56-83ca-cfbb5256e7fc-kube-api-access-nt462" (OuterVolumeSpecName: "kube-api-access-nt462") pod "7dd504f7-f59c-4f56-83ca-cfbb5256e7fc" (UID: "7dd504f7-f59c-4f56-83ca-cfbb5256e7fc"). InnerVolumeSpecName "kube-api-access-nt462". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 13 06:56:03.800985 kubelet[1935]: I0513 06:56:03.800956 1935 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-nt462\" (UniqueName: \"kubernetes.io/projected/7dd504f7-f59c-4f56-83ca-cfbb5256e7fc-kube-api-access-nt462\") on node \"ci-3510-3-7-n-7f05b50207.novalocal\" DevicePath \"\"" May 13 06:56:03.801161 kubelet[1935]: I0513 06:56:03.801149 1935 reconciler_common.go:299] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/7dd504f7-f59c-4f56-83ca-cfbb5256e7fc-calico-apiserver-certs\") on node \"ci-3510-3-7-n-7f05b50207.novalocal\" DevicePath \"\"" May 13 06:56:04.042703 kubelet[1935]: I0513 06:56:04.042580 1935 scope.go:117] "RemoveContainer" containerID="cd00a0ba1675bbecb0b304fddeb10f2520129f67626abb471440901a5aa2737d" May 13 06:56:04.047155 systemd[1]: Removed slice kubepods-besteffort-pod7dd504f7_f59c_4f56_83ca_cfbb5256e7fc.slice. May 13 06:56:04.050609 env[1155]: time="2025-05-13T06:56:04.050557223Z" level=info msg="RemoveContainer for \"cd00a0ba1675bbecb0b304fddeb10f2520129f67626abb471440901a5aa2737d\"" May 13 06:56:04.063489 env[1155]: time="2025-05-13T06:56:04.063372121Z" level=info msg="RemoveContainer for \"cd00a0ba1675bbecb0b304fddeb10f2520129f67626abb471440901a5aa2737d\" returns successfully" May 13 06:56:04.063849 kubelet[1935]: I0513 06:56:04.063778 1935 scope.go:117] "RemoveContainer" containerID="cd00a0ba1675bbecb0b304fddeb10f2520129f67626abb471440901a5aa2737d" May 13 06:56:04.066476 env[1155]: time="2025-05-13T06:56:04.064739108Z" level=error msg="ContainerStatus for \"cd00a0ba1675bbecb0b304fddeb10f2520129f67626abb471440901a5aa2737d\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"cd00a0ba1675bbecb0b304fddeb10f2520129f67626abb471440901a5aa2737d\": not found" May 13 06:56:04.066661 kubelet[1935]: E0513 06:56:04.065552 1935 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"cd00a0ba1675bbecb0b304fddeb10f2520129f67626abb471440901a5aa2737d\": not found" containerID="cd00a0ba1675bbecb0b304fddeb10f2520129f67626abb471440901a5aa2737d" May 13 06:56:04.066661 kubelet[1935]: I0513 06:56:04.065612 1935 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"cd00a0ba1675bbecb0b304fddeb10f2520129f67626abb471440901a5aa2737d"} err="failed to get container status \"cd00a0ba1675bbecb0b304fddeb10f2520129f67626abb471440901a5aa2737d\": rpc error: code = NotFound desc = an error occurred when try to find container \"cd00a0ba1675bbecb0b304fddeb10f2520129f67626abb471440901a5aa2737d\": not found" May 13 06:56:04.212513 kubelet[1935]: I0513 06:56:04.212435 1935 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="7dd504f7-f59c-4f56-83ca-cfbb5256e7fc" path="/var/lib/kubelet/pods/7dd504f7-f59c-4f56-83ca-cfbb5256e7fc/volumes" May 13 06:56:04.289515 systemd[1]: var-lib-kubelet-pods-7dd504f7\x2df59c\x2d4f56\x2d83ca\x2dcfbb5256e7fc-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dnt462.mount: Deactivated successfully. May 13 06:56:04.317000 audit[6190]: NETFILTER_CFG table=filter:148 family=2 entries=8 op=nft_register_rule pid=6190 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:56:04.317000 audit[6190]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffccc476420 a2=0 a3=7ffccc47640c items=0 ppid=2110 pid=6190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:56:04.317000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:56:04.324000 audit[6190]: NETFILTER_CFG table=nat:149 family=2 entries=36 op=nft_register_rule pid=6190 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:56:04.324000 audit[6190]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffccc476420 a2=0 a3=7ffccc47640c items=0 ppid=2110 pid=6190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:56:04.324000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:56:08.014286 systemd[1]: run-containerd-runc-k8s.io-d10c6ca480ef1b90e96f35f701895afcc8e95210bedd37648a0403a4986d45d1-runc.1ryAFe.mount: Deactivated successfully. May 13 06:56:08.997116 systemd[1]: run-containerd-runc-k8s.io-77c826a179699678c835a374be396d626293f654860c5d49017b345319e79d84-runc.mAIUI6.mount: Deactivated successfully. May 13 06:56:10.987253 kernel: kauditd_printk_skb: 18 callbacks suppressed May 13 06:56:10.987518 kernel: audit: type=1400 audit(1747119370.981:1620): avc: denied { watch } for pid=4187 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_54_48.3599752594/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c633,c794 tclass=file permissive=0 May 13 06:56:10.981000 audit[4187]: AVC avc: denied { watch } for pid=4187 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_54_48.3599752594/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c633,c794 tclass=file permissive=0 May 13 06:56:10.981000 audit[4187]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f689c0 a2=fc6 a3=0 items=0 ppid=3642 pid=4187 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 key=(null) May 13 06:56:11.017813 kernel: audit: type=1300 audit(1747119370.981:1620): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f689c0 a2=fc6 a3=0 items=0 ppid=3642 pid=4187 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 key=(null) May 13 06:56:10.981000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 06:56:11.034034 kernel: audit: type=1327 audit(1747119370.981:1620): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 06:56:13.036000 audit[4309]: AVC avc: denied { watch } for pid=4309 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_55_11.4127886896/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c848 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c416,c848 tclass=file permissive=0 May 13 06:56:13.045077 kernel: audit: type=1400 audit(1747119373.036:1621): avc: denied { watch } for pid=4309 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_55_11.4127886896/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c848 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c416,c848 tclass=file permissive=0 May 13 06:56:13.036000 audit[4309]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000e2b0a0 a2=fc6 a3=0 items=0 ppid=4255 pid=4309 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c848 key=(null) May 13 06:56:13.036000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 06:56:13.061134 kernel: audit: type=1300 audit(1747119373.036:1621): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000e2b0a0 a2=fc6 a3=0 items=0 ppid=4255 pid=4309 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c848 key=(null) May 13 06:56:13.061208 kernel: audit: type=1327 audit(1747119373.036:1621): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 06:56:14.464000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:56:14.482947 kernel: audit: type=1400 audit(1747119374.464:1622): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:56:14.483043 kernel: audit: type=1300 audit(1747119374.464:1622): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002493c80 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:56:14.464000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002493c80 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:56:14.464000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:56:14.513957 kernel: audit: type=1327 audit(1747119374.464:1622): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:56:14.464000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:56:14.521837 kernel: audit: type=1400 audit(1747119374.464:1623): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:56:14.464000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b4a340 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:56:14.464000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:56:14.805000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:56:14.805000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00d163bc0 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:56:14.805000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:56:14.805000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:56:14.805000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00d163c50 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:56:14.805000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:56:14.806000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:56:14.806000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00cc0fea0 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:56:14.806000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:56:14.810000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:56:14.810000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00d163dd0 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:56:14.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:56:14.864000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:56:14.865000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:56:14.865000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00cd80c60 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:56:14.865000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:56:14.864000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00dc87980 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:56:14.864000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:56:19.825469 env[1155]: time="2025-05-13T06:56:19.825332537Z" level=info msg="StopPodSandbox for \"f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb\"" May 13 06:56:19.930812 env[1155]: 2025-05-13 06:56:19.886 [WARNING][6257] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:56:19.930812 env[1155]: 2025-05-13 06:56:19.886 [INFO][6257] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" May 13 06:56:19.930812 env[1155]: 2025-05-13 06:56:19.886 [INFO][6257] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" iface="eth0" netns="" May 13 06:56:19.930812 env[1155]: 2025-05-13 06:56:19.886 [INFO][6257] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" May 13 06:56:19.930812 env[1155]: 2025-05-13 06:56:19.886 [INFO][6257] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" May 13 06:56:19.930812 env[1155]: 2025-05-13 06:56:19.914 [INFO][6264] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" HandleID="k8s-pod-network.f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:56:19.930812 env[1155]: 2025-05-13 06:56:19.914 [INFO][6264] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:56:19.930812 env[1155]: 2025-05-13 06:56:19.914 [INFO][6264] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:56:19.930812 env[1155]: 2025-05-13 06:56:19.923 [WARNING][6264] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" HandleID="k8s-pod-network.f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:56:19.930812 env[1155]: 2025-05-13 06:56:19.923 [INFO][6264] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" HandleID="k8s-pod-network.f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:56:19.930812 env[1155]: 2025-05-13 06:56:19.928 [INFO][6264] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:56:19.930812 env[1155]: 2025-05-13 06:56:19.929 [INFO][6257] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" May 13 06:56:19.931337 env[1155]: time="2025-05-13T06:56:19.930842441Z" level=info msg="TearDown network for sandbox \"f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb\" successfully" May 13 06:56:19.931337 env[1155]: time="2025-05-13T06:56:19.930871955Z" level=info msg="StopPodSandbox for \"f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb\" returns successfully" May 13 06:56:19.931398 env[1155]: time="2025-05-13T06:56:19.931333607Z" level=info msg="RemovePodSandbox for \"f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb\"" May 13 06:56:19.931398 env[1155]: time="2025-05-13T06:56:19.931362631Z" level=info msg="Forcibly stopping sandbox \"f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb\"" May 13 06:56:20.010837 env[1155]: 2025-05-13 06:56:19.972 [WARNING][6282] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:56:20.010837 env[1155]: 2025-05-13 06:56:19.972 [INFO][6282] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" May 13 06:56:20.010837 env[1155]: 2025-05-13 06:56:19.972 [INFO][6282] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" iface="eth0" netns="" May 13 06:56:20.010837 env[1155]: 2025-05-13 06:56:19.972 [INFO][6282] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" May 13 06:56:20.010837 env[1155]: 2025-05-13 06:56:19.973 [INFO][6282] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" May 13 06:56:20.010837 env[1155]: 2025-05-13 06:56:19.999 [INFO][6289] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" HandleID="k8s-pod-network.f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:56:20.010837 env[1155]: 2025-05-13 06:56:19.999 [INFO][6289] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:56:20.010837 env[1155]: 2025-05-13 06:56:19.999 [INFO][6289] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:56:20.010837 env[1155]: 2025-05-13 06:56:20.006 [WARNING][6289] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" HandleID="k8s-pod-network.f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:56:20.010837 env[1155]: 2025-05-13 06:56:20.006 [INFO][6289] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" HandleID="k8s-pod-network.f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--p7jjc-eth0" May 13 06:56:20.010837 env[1155]: 2025-05-13 06:56:20.007 [INFO][6289] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:56:20.010837 env[1155]: 2025-05-13 06:56:20.008 [INFO][6282] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb" May 13 06:56:20.011336 env[1155]: time="2025-05-13T06:56:20.010875789Z" level=info msg="TearDown network for sandbox \"f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb\" successfully" May 13 06:56:20.016891 env[1155]: time="2025-05-13T06:56:20.016820996Z" level=info msg="RemovePodSandbox \"f13102fa6b3e666978773a749e4b871049313e2f318c558d58ce169b941dedbb\" returns successfully" May 13 06:56:20.017435 env[1155]: time="2025-05-13T06:56:20.017401627Z" level=info msg="StopPodSandbox for \"d49f46d7ff5366d535ed829232c20e3ee4f3c942fe48d2f6875c6d1390fc553a\"" May 13 06:56:20.017547 env[1155]: time="2025-05-13T06:56:20.017498586Z" level=info msg="TearDown network for sandbox \"d49f46d7ff5366d535ed829232c20e3ee4f3c942fe48d2f6875c6d1390fc553a\" successfully" May 13 06:56:20.017547 env[1155]: time="2025-05-13T06:56:20.017538700Z" level=info msg="StopPodSandbox for \"d49f46d7ff5366d535ed829232c20e3ee4f3c942fe48d2f6875c6d1390fc553a\" returns successfully" May 13 06:56:20.017856 env[1155]: time="2025-05-13T06:56:20.017825799Z" level=info msg="RemovePodSandbox for \"d49f46d7ff5366d535ed829232c20e3ee4f3c942fe48d2f6875c6d1390fc553a\"" May 13 06:56:20.017897 env[1155]: time="2025-05-13T06:56:20.017853520Z" level=info msg="Forcibly stopping sandbox \"d49f46d7ff5366d535ed829232c20e3ee4f3c942fe48d2f6875c6d1390fc553a\"" May 13 06:56:20.017979 env[1155]: time="2025-05-13T06:56:20.017911698Z" level=info msg="TearDown network for sandbox \"d49f46d7ff5366d535ed829232c20e3ee4f3c942fe48d2f6875c6d1390fc553a\" successfully" May 13 06:56:20.023000 env[1155]: time="2025-05-13T06:56:20.022347059Z" level=info msg="RemovePodSandbox \"d49f46d7ff5366d535ed829232c20e3ee4f3c942fe48d2f6875c6d1390fc553a\" returns successfully" May 13 06:56:20.023329 env[1155]: time="2025-05-13T06:56:20.023303865Z" level=info msg="StopPodSandbox for \"d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362\"" May 13 06:56:20.102484 env[1155]: 2025-05-13 06:56:20.067 [WARNING][6307] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:56:20.102484 env[1155]: 2025-05-13 06:56:20.067 [INFO][6307] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" May 13 06:56:20.102484 env[1155]: 2025-05-13 06:56:20.067 [INFO][6307] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" iface="eth0" netns="" May 13 06:56:20.102484 env[1155]: 2025-05-13 06:56:20.067 [INFO][6307] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" May 13 06:56:20.102484 env[1155]: 2025-05-13 06:56:20.067 [INFO][6307] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" May 13 06:56:20.102484 env[1155]: 2025-05-13 06:56:20.088 [INFO][6314] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" HandleID="k8s-pod-network.d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:56:20.102484 env[1155]: 2025-05-13 06:56:20.088 [INFO][6314] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:56:20.102484 env[1155]: 2025-05-13 06:56:20.088 [INFO][6314] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:56:20.102484 env[1155]: 2025-05-13 06:56:20.097 [WARNING][6314] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" HandleID="k8s-pod-network.d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:56:20.102484 env[1155]: 2025-05-13 06:56:20.097 [INFO][6314] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" HandleID="k8s-pod-network.d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:56:20.102484 env[1155]: 2025-05-13 06:56:20.099 [INFO][6314] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:56:20.102484 env[1155]: 2025-05-13 06:56:20.101 [INFO][6307] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" May 13 06:56:20.103103 env[1155]: time="2025-05-13T06:56:20.103072642Z" level=info msg="TearDown network for sandbox \"d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362\" successfully" May 13 06:56:20.103212 env[1155]: time="2025-05-13T06:56:20.103191731Z" level=info msg="StopPodSandbox for \"d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362\" returns successfully" May 13 06:56:20.105529 env[1155]: time="2025-05-13T06:56:20.105495741Z" level=info msg="RemovePodSandbox for \"d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362\"" May 13 06:56:20.105608 env[1155]: time="2025-05-13T06:56:20.105538100Z" level=info msg="Forcibly stopping sandbox \"d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362\"" May 13 06:56:20.207934 env[1155]: 2025-05-13 06:56:20.163 [WARNING][6332] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:56:20.207934 env[1155]: 2025-05-13 06:56:20.163 [INFO][6332] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" May 13 06:56:20.207934 env[1155]: 2025-05-13 06:56:20.163 [INFO][6332] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" iface="eth0" netns="" May 13 06:56:20.207934 env[1155]: 2025-05-13 06:56:20.163 [INFO][6332] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" May 13 06:56:20.207934 env[1155]: 2025-05-13 06:56:20.163 [INFO][6332] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" May 13 06:56:20.207934 env[1155]: 2025-05-13 06:56:20.195 [INFO][6339] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" HandleID="k8s-pod-network.d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:56:20.207934 env[1155]: 2025-05-13 06:56:20.195 [INFO][6339] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:56:20.207934 env[1155]: 2025-05-13 06:56:20.195 [INFO][6339] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:56:20.207934 env[1155]: 2025-05-13 06:56:20.203 [WARNING][6339] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" HandleID="k8s-pod-network.d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:56:20.207934 env[1155]: 2025-05-13 06:56:20.203 [INFO][6339] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" HandleID="k8s-pod-network.d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--apiserver--579977495--4vp7r-eth0" May 13 06:56:20.207934 env[1155]: 2025-05-13 06:56:20.205 [INFO][6339] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:56:20.207934 env[1155]: 2025-05-13 06:56:20.206 [INFO][6332] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362" May 13 06:56:20.208405 env[1155]: time="2025-05-13T06:56:20.207961437Z" level=info msg="TearDown network for sandbox \"d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362\" successfully" May 13 06:56:20.214553 env[1155]: time="2025-05-13T06:56:20.214516649Z" level=info msg="RemovePodSandbox \"d34a5dcd35999b66c856c596e51ab8931c1a483be053056806da794002778362\" returns successfully" May 13 06:56:20.214886 env[1155]: time="2025-05-13T06:56:20.214860694Z" level=info msg="StopPodSandbox for \"51343e923587e69c5873f41cfd42af9a536d33902f9ba35828ea33ee017b0eeb\"" May 13 06:56:20.215046 env[1155]: time="2025-05-13T06:56:20.215000422Z" level=info msg="TearDown network for sandbox \"51343e923587e69c5873f41cfd42af9a536d33902f9ba35828ea33ee017b0eeb\" successfully" May 13 06:56:20.215046 env[1155]: time="2025-05-13T06:56:20.215041748Z" level=info msg="StopPodSandbox for \"51343e923587e69c5873f41cfd42af9a536d33902f9ba35828ea33ee017b0eeb\" returns successfully" May 13 06:56:20.215341 env[1155]: time="2025-05-13T06:56:20.215305674Z" level=info msg="RemovePodSandbox for \"51343e923587e69c5873f41cfd42af9a536d33902f9ba35828ea33ee017b0eeb\"" May 13 06:56:20.215395 env[1155]: time="2025-05-13T06:56:20.215331272Z" level=info msg="Forcibly stopping sandbox \"51343e923587e69c5873f41cfd42af9a536d33902f9ba35828ea33ee017b0eeb\"" May 13 06:56:20.215433 env[1155]: time="2025-05-13T06:56:20.215391032Z" level=info msg="TearDown network for sandbox \"51343e923587e69c5873f41cfd42af9a536d33902f9ba35828ea33ee017b0eeb\" successfully" May 13 06:56:20.219366 env[1155]: time="2025-05-13T06:56:20.219324388Z" level=info msg="RemovePodSandbox \"51343e923587e69c5873f41cfd42af9a536d33902f9ba35828ea33ee017b0eeb\" returns successfully" May 13 06:56:20.219697 env[1155]: time="2025-05-13T06:56:20.219670978Z" level=info msg="StopPodSandbox for \"9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279\"" May 13 06:56:20.304639 env[1155]: 2025-05-13 06:56:20.264 [WARNING][6358] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:56:20.304639 env[1155]: 2025-05-13 06:56:20.264 [INFO][6358] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" May 13 06:56:20.304639 env[1155]: 2025-05-13 06:56:20.264 [INFO][6358] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" iface="eth0" netns="" May 13 06:56:20.304639 env[1155]: 2025-05-13 06:56:20.264 [INFO][6358] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" May 13 06:56:20.304639 env[1155]: 2025-05-13 06:56:20.264 [INFO][6358] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" May 13 06:56:20.304639 env[1155]: 2025-05-13 06:56:20.291 [INFO][6365] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" HandleID="k8s-pod-network.9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:56:20.304639 env[1155]: 2025-05-13 06:56:20.291 [INFO][6365] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:56:20.304639 env[1155]: 2025-05-13 06:56:20.291 [INFO][6365] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:56:20.304639 env[1155]: 2025-05-13 06:56:20.301 [WARNING][6365] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" HandleID="k8s-pod-network.9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:56:20.304639 env[1155]: 2025-05-13 06:56:20.301 [INFO][6365] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" HandleID="k8s-pod-network.9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:56:20.304639 env[1155]: 2025-05-13 06:56:20.302 [INFO][6365] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:56:20.304639 env[1155]: 2025-05-13 06:56:20.303 [INFO][6358] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" May 13 06:56:20.305136 env[1155]: time="2025-05-13T06:56:20.304666987Z" level=info msg="TearDown network for sandbox \"9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279\" successfully" May 13 06:56:20.305136 env[1155]: time="2025-05-13T06:56:20.304696030Z" level=info msg="StopPodSandbox for \"9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279\" returns successfully" May 13 06:56:20.305136 env[1155]: time="2025-05-13T06:56:20.305099365Z" level=info msg="RemovePodSandbox for \"9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279\"" May 13 06:56:20.305246 env[1155]: time="2025-05-13T06:56:20.305150098Z" level=info msg="Forcibly stopping sandbox \"9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279\"" May 13 06:56:20.391937 env[1155]: 2025-05-13 06:56:20.341 [WARNING][6384] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" WorkloadEndpoint="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:56:20.391937 env[1155]: 2025-05-13 06:56:20.341 [INFO][6384] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" May 13 06:56:20.391937 env[1155]: 2025-05-13 06:56:20.342 [INFO][6384] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" iface="eth0" netns="" May 13 06:56:20.391937 env[1155]: 2025-05-13 06:56:20.342 [INFO][6384] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" May 13 06:56:20.391937 env[1155]: 2025-05-13 06:56:20.342 [INFO][6384] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" May 13 06:56:20.391937 env[1155]: 2025-05-13 06:56:20.371 [INFO][6392] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" HandleID="k8s-pod-network.9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:56:20.391937 env[1155]: 2025-05-13 06:56:20.373 [INFO][6392] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 06:56:20.391937 env[1155]: 2025-05-13 06:56:20.374 [INFO][6392] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 06:56:20.391937 env[1155]: 2025-05-13 06:56:20.382 [WARNING][6392] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" HandleID="k8s-pod-network.9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:56:20.391937 env[1155]: 2025-05-13 06:56:20.384 [INFO][6392] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" HandleID="k8s-pod-network.9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" Workload="ci--3510--3--7--n--7f05b50207.novalocal-k8s-calico--kube--controllers--55c78455dd--hxgrr-eth0" May 13 06:56:20.391937 env[1155]: 2025-05-13 06:56:20.390 [INFO][6392] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 06:56:20.391937 env[1155]: 2025-05-13 06:56:20.391 [INFO][6384] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279" May 13 06:56:20.392460 env[1155]: time="2025-05-13T06:56:20.392419401Z" level=info msg="TearDown network for sandbox \"9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279\" successfully" May 13 06:56:20.396550 env[1155]: time="2025-05-13T06:56:20.396517360Z" level=info msg="RemovePodSandbox \"9be5ba5781cc96fdef1d4309ce5f1d1255d4ee4978b0fd8db23ded7dcf7b8279\" returns successfully" May 13 06:56:23.666704 kernel: kauditd_printk_skb: 20 callbacks suppressed May 13 06:56:23.666969 kernel: audit: type=1400 audit(1747119383.661:1630): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:56:23.661000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:56:23.663000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:56:23.663000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d081a0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:56:23.713698 kernel: audit: type=1400 audit(1747119383.663:1631): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:56:23.713954 kernel: audit: type=1300 audit(1747119383.663:1631): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d081a0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:56:23.663000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:56:23.733941 kernel: audit: type=1327 audit(1747119383.663:1631): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:56:23.663000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:56:23.663000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d08220 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:56:23.750228 kernel: audit: type=1400 audit(1747119383.663:1632): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:56:23.750356 kernel: audit: type=1300 audit(1747119383.663:1632): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d08220 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:56:23.663000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:56:23.757044 kernel: audit: type=1327 audit(1747119383.663:1632): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:56:23.661000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0001413a0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:56:23.661000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:56:23.772727 kernel: audit: type=1300 audit(1747119383.661:1630): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0001413a0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:56:23.772842 kernel: audit: type=1327 audit(1747119383.661:1630): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:56:23.772869 kernel: audit: type=1400 audit(1747119383.678:1633): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:56:23.678000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:56:23.678000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d09140 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:56:23.678000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:56:36.603706 systemd[1]: run-containerd-runc-k8s.io-77c826a179699678c835a374be396d626293f654860c5d49017b345319e79d84-runc.1xdbUn.mount: Deactivated successfully. May 13 06:56:37.998245 systemd[1]: run-containerd-runc-k8s.io-d10c6ca480ef1b90e96f35f701895afcc8e95210bedd37648a0403a4986d45d1-runc.akJSUu.mount: Deactivated successfully. May 13 06:56:39.008875 systemd[1]: run-containerd-runc-k8s.io-77c826a179699678c835a374be396d626293f654860c5d49017b345319e79d84-runc.QeAudA.mount: Deactivated successfully. May 13 06:57:07.988083 systemd[1]: run-containerd-runc-k8s.io-d10c6ca480ef1b90e96f35f701895afcc8e95210bedd37648a0403a4986d45d1-runc.bUVUoX.mount: Deactivated successfully. May 13 06:57:08.998710 systemd[1]: run-containerd-runc-k8s.io-77c826a179699678c835a374be396d626293f654860c5d49017b345319e79d84-runc.FzEwoE.mount: Deactivated successfully. May 13 06:57:10.984000 audit[4187]: AVC avc: denied { watch } for pid=4187 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_54_48.3599752594/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c633,c794 tclass=file permissive=0 May 13 06:57:10.988786 kernel: kauditd_printk_skb: 2 callbacks suppressed May 13 06:57:10.989052 kernel: audit: type=1400 audit(1747119430.984:1634): avc: denied { watch } for pid=4187 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_54_48.3599752594/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c633,c794 tclass=file permissive=0 May 13 06:57:10.984000 audit[4187]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001a35d40 a2=fc6 a3=0 items=0 ppid=3642 pid=4187 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 key=(null) May 13 06:57:11.023978 kernel: audit: type=1300 audit(1747119430.984:1634): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001a35d40 a2=fc6 a3=0 items=0 ppid=3642 pid=4187 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 key=(null) May 13 06:57:11.024099 kernel: audit: type=1327 audit(1747119430.984:1634): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 06:57:10.984000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 06:57:13.051000 audit[4309]: AVC avc: denied { watch } for pid=4309 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_55_11.4127886896/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c848 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c416,c848 tclass=file permissive=0 May 13 06:57:13.068982 kernel: audit: type=1400 audit(1747119433.051:1635): avc: denied { watch } for pid=4309 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_55_11.4127886896/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c848 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c416,c848 tclass=file permissive=0 May 13 06:57:13.051000 audit[4309]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f48260 a2=fc6 a3=0 items=0 ppid=4255 pid=4309 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c848 key=(null) May 13 06:57:13.051000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 06:57:13.106819 kernel: audit: type=1300 audit(1747119433.051:1635): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f48260 a2=fc6 a3=0 items=0 ppid=4255 pid=4309 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c848 key=(null) May 13 06:57:13.107048 kernel: audit: type=1327 audit(1747119433.051:1635): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 06:57:14.465000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:57:14.465000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0026d8b10 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:57:14.497303 kernel: audit: type=1400 audit(1747119434.465:1636): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:57:14.497486 kernel: audit: type=1300 audit(1747119434.465:1636): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0026d8b10 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:57:14.497982 kernel: audit: type=1327 audit(1747119434.465:1636): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:57:14.465000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:57:14.467000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:57:14.467000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0030c9c40 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:57:14.467000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:57:14.526967 kernel: audit: type=1400 audit(1747119434.467:1637): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:57:14.807000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:57:14.807000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00e0f1c50 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:57:14.807000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:57:14.807000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:57:14.807000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00e338140 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:57:14.807000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:57:14.807000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:57:14.807000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00e0f1ce0 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:57:14.807000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:57:14.811000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:57:14.811000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00e3df1d0 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:57:14.811000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:57:14.866000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:57:14.866000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00e338180 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:57:14.866000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:57:14.867000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:57:14.867000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00e0f1f50 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:57:14.867000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:57:23.670066 kernel: kauditd_printk_skb: 20 callbacks suppressed May 13 06:57:23.670482 kernel: audit: type=1400 audit(1747119443.663:1644): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:57:23.663000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:57:23.663000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00303f6e0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:57:23.706356 kernel: audit: type=1300 audit(1747119443.663:1644): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00303f6e0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:57:23.706560 kernel: audit: type=1327 audit(1747119443.663:1644): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:57:23.663000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:57:23.664000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:57:23.741320 kernel: audit: type=1400 audit(1747119443.664:1645): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:57:23.741580 kernel: audit: type=1300 audit(1747119443.664:1645): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00303f700 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:57:23.664000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00303f700 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:57:23.664000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:57:23.757439 kernel: audit: type=1327 audit(1747119443.664:1645): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:57:23.757614 kernel: audit: type=1400 audit(1747119443.666:1646): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:57:23.666000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:57:23.763396 kernel: audit: type=1300 audit(1747119443.666:1646): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00303f8a0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:57:23.666000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00303f8a0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:57:23.666000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:57:23.779547 kernel: audit: type=1327 audit(1747119443.666:1646): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:57:23.779719 kernel: audit: type=1400 audit(1747119443.679:1647): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:57:23.679000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:57:23.679000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00303fbc0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:57:23.679000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:57:36.613170 systemd[1]: run-containerd-runc-k8s.io-77c826a179699678c835a374be396d626293f654860c5d49017b345319e79d84-runc.Ug6j0w.mount: Deactivated successfully. May 13 06:57:39.013785 systemd[1]: run-containerd-runc-k8s.io-77c826a179699678c835a374be396d626293f654860c5d49017b345319e79d84-runc.TwRF1f.mount: Deactivated successfully. May 13 06:58:10.986000 audit[4187]: AVC avc: denied { watch } for pid=4187 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_54_48.3599752594/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c633,c794 tclass=file permissive=0 May 13 06:58:10.990507 kernel: kauditd_printk_skb: 2 callbacks suppressed May 13 06:58:10.990673 kernel: audit: type=1400 audit(1747119490.986:1648): avc: denied { watch } for pid=4187 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_54_48.3599752594/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c633,c794 tclass=file permissive=0 May 13 06:58:10.986000 audit[4187]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001280160 a2=fc6 a3=0 items=0 ppid=3642 pid=4187 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 key=(null) May 13 06:58:11.027024 kernel: audit: type=1300 audit(1747119490.986:1648): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001280160 a2=fc6 a3=0 items=0 ppid=3642 pid=4187 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 key=(null) May 13 06:58:11.027129 kernel: audit: type=1327 audit(1747119490.986:1648): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 06:58:10.986000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 06:58:13.090000 audit[4309]: AVC avc: denied { watch } for pid=4309 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_55_11.4127886896/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c848 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c416,c848 tclass=file permissive=0 May 13 06:58:13.109113 kernel: audit: type=1400 audit(1747119493.090:1649): avc: denied { watch } for pid=4309 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_55_11.4127886896/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c848 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c416,c848 tclass=file permissive=0 May 13 06:58:13.090000 audit[4309]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f482a0 a2=fc6 a3=0 items=0 ppid=4255 pid=4309 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c848 key=(null) May 13 06:58:13.090000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 06:58:13.145478 kernel: audit: type=1300 audit(1747119493.090:1649): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f482a0 a2=fc6 a3=0 items=0 ppid=4255 pid=4309 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c848 key=(null) May 13 06:58:13.145696 kernel: audit: type=1327 audit(1747119493.090:1649): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 06:58:14.466000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:58:14.466000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002d2bf80 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:58:14.509544 kernel: audit: type=1400 audit(1747119494.466:1650): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:58:14.509854 kernel: audit: type=1300 audit(1747119494.466:1650): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002d2bf80 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:58:14.466000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:58:14.523961 kernel: audit: type=1327 audit(1747119494.466:1650): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:58:14.468000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:58:14.468000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002d4fd40 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:58:14.536063 kernel: audit: type=1400 audit(1747119494.468:1651): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:58:14.468000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:58:14.808000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:58:14.808000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:58:14.808000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00e5d4000 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:58:14.808000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:58:14.809000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:58:14.809000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0104bc000 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:58:14.809000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:58:14.808000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c01136f830 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:58:14.808000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:58:14.811000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:58:14.811000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c01136f860 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:58:14.811000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:58:14.867000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:58:14.867000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:58:14.867000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c01136fdd0 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:58:14.867000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:58:14.867000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0104bc520 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:58:14.867000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:58:18.067141 systemd[1]: Started sshd@7-172.24.4.54:22-172.24.4.1:34510.service. May 13 06:58:18.075459 kernel: kauditd_printk_skb: 20 callbacks suppressed May 13 06:58:18.075631 kernel: audit: type=1130 audit(1747119498.067:1658): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.54:22-172.24.4.1:34510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:58:18.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.54:22-172.24.4.1:34510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:58:19.288000 audit[6653]: USER_ACCT pid=6653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:19.335298 kernel: audit: type=1101 audit(1747119499.288:1659): pid=6653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:19.335433 kernel: audit: type=1103 audit(1747119499.304:1660): pid=6653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:19.335496 kernel: audit: type=1006 audit(1747119499.304:1661): pid=6653 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 May 13 06:58:19.304000 audit[6653]: CRED_ACQ pid=6653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:19.335688 sshd[6653]: Accepted publickey for core from 172.24.4.1 port 34510 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:58:19.307700 sshd[6653]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:58:19.304000 audit[6653]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff00f60ff0 a2=3 a3=0 items=0 ppid=1 pid=6653 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:58:19.353968 kernel: audit: type=1300 audit(1747119499.304:1661): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff00f60ff0 a2=3 a3=0 items=0 ppid=1 pid=6653 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:58:19.304000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 06:58:19.361087 kernel: audit: type=1327 audit(1747119499.304:1661): proctitle=737368643A20636F7265205B707269765D May 13 06:58:19.368446 systemd[1]: Started session-8.scope. May 13 06:58:19.369439 systemd-logind[1144]: New session 8 of user core. May 13 06:58:19.382000 audit[6653]: USER_START pid=6653 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:19.391086 kernel: audit: type=1105 audit(1747119499.382:1662): pid=6653 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:19.391000 audit[6667]: CRED_ACQ pid=6667 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:19.398031 kernel: audit: type=1103 audit(1747119499.391:1663): pid=6667 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:20.015357 sshd[6653]: pam_unix(sshd:session): session closed for user core May 13 06:58:20.016000 audit[6653]: USER_END pid=6653 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:20.025354 systemd[1]: sshd@7-172.24.4.54:22-172.24.4.1:34510.service: Deactivated successfully. May 13 06:58:20.026001 kernel: audit: type=1106 audit(1747119500.016:1664): pid=6653 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:20.017000 audit[6653]: CRED_DISP pid=6653 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:20.026899 systemd[1]: session-8.scope: Deactivated successfully. May 13 06:58:20.040963 kernel: audit: type=1104 audit(1747119500.017:1665): pid=6653 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:20.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.54:22-172.24.4.1:34510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:58:20.042042 systemd-logind[1144]: Session 8 logged out. Waiting for processes to exit. May 13 06:58:20.044153 systemd-logind[1144]: Removed session 8. May 13 06:58:23.666000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:58:23.671055 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 06:58:23.671321 kernel: audit: type=1400 audit(1747119503.666:1667): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:58:23.686590 kernel: audit: type=1400 audit(1747119503.666:1668): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:58:23.666000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:58:23.666000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011f3c00 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:58:23.724439 kernel: audit: type=1300 audit(1747119503.666:1668): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011f3c00 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:58:23.666000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:58:23.672000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:58:23.758730 kernel: audit: type=1327 audit(1747119503.666:1668): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:58:23.759034 kernel: audit: type=1400 audit(1747119503.672:1669): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:58:23.759168 kernel: audit: type=1300 audit(1747119503.672:1669): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011f3f20 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:58:23.672000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011f3f20 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:58:23.672000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:58:23.786070 kernel: audit: type=1327 audit(1747119503.672:1669): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:58:23.786193 kernel: audit: type=1300 audit(1747119503.666:1667): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001fd0d00 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:58:23.666000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001fd0d00 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:58:23.793381 kernel: audit: type=1327 audit(1747119503.666:1667): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:58:23.666000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:58:23.681000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:58:23.805408 kernel: audit: type=1400 audit(1747119503.681:1670): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:58:23.681000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c0e200 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:58:23.681000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:58:25.032878 systemd[1]: Started sshd@8-172.24.4.54:22-172.24.4.1:56292.service. May 13 06:58:25.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.54:22-172.24.4.1:56292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:58:26.330000 audit[6681]: USER_ACCT pid=6681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:26.333996 sshd[6681]: Accepted publickey for core from 172.24.4.1 port 56292 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:58:26.336560 sshd[6681]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:58:26.334000 audit[6681]: CRED_ACQ pid=6681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:26.334000 audit[6681]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3e1093b0 a2=3 a3=0 items=0 ppid=1 pid=6681 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:58:26.334000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 06:58:26.350637 systemd-logind[1144]: New session 9 of user core. May 13 06:58:26.352356 systemd[1]: Started session-9.scope. May 13 06:58:26.366000 audit[6681]: USER_START pid=6681 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:26.369000 audit[6685]: CRED_ACQ pid=6685 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:27.451221 sshd[6681]: pam_unix(sshd:session): session closed for user core May 13 06:58:27.456000 audit[6681]: USER_END pid=6681 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:27.456000 audit[6681]: CRED_DISP pid=6681 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:27.461270 systemd[1]: sshd@8-172.24.4.54:22-172.24.4.1:56292.service: Deactivated successfully. May 13 06:58:27.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.54:22-172.24.4.1:56292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:58:27.464079 systemd[1]: session-9.scope: Deactivated successfully. May 13 06:58:27.465707 systemd-logind[1144]: Session 9 logged out. Waiting for processes to exit. May 13 06:58:27.469311 systemd-logind[1144]: Removed session 9. May 13 06:58:32.470166 systemd[1]: Started sshd@9-172.24.4.54:22-172.24.4.1:56308.service. May 13 06:58:32.492817 kernel: kauditd_printk_skb: 13 callbacks suppressed May 13 06:58:32.493168 kernel: audit: type=1130 audit(1747119512.470:1680): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.54:22-172.24.4.1:56308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:58:32.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.54:22-172.24.4.1:56308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:58:33.761459 sshd[6696]: Accepted publickey for core from 172.24.4.1 port 56308 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:58:33.760000 audit[6696]: USER_ACCT pid=6696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:33.781000 audit[6696]: CRED_ACQ pid=6696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:33.782849 sshd[6696]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:58:33.796670 kernel: audit: type=1101 audit(1747119513.760:1681): pid=6696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:33.796812 kernel: audit: type=1103 audit(1747119513.781:1682): pid=6696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:33.798050 kernel: audit: type=1006 audit(1747119513.781:1683): pid=6696 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 13 06:58:33.781000 audit[6696]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8c120ee0 a2=3 a3=0 items=0 ppid=1 pid=6696 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:58:33.822973 kernel: audit: type=1300 audit(1747119513.781:1683): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8c120ee0 a2=3 a3=0 items=0 ppid=1 pid=6696 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:58:33.781000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 06:58:33.829997 kernel: audit: type=1327 audit(1747119513.781:1683): proctitle=737368643A20636F7265205B707269765D May 13 06:58:33.836841 systemd-logind[1144]: New session 10 of user core. May 13 06:58:33.838952 systemd[1]: Started session-10.scope. May 13 06:58:33.852000 audit[6696]: USER_START pid=6696 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:33.871689 kernel: audit: type=1105 audit(1747119513.852:1684): pid=6696 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:33.872078 kernel: audit: type=1103 audit(1747119513.856:1685): pid=6698 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:33.856000 audit[6698]: CRED_ACQ pid=6698 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:34.506171 sshd[6696]: pam_unix(sshd:session): session closed for user core May 13 06:58:34.507000 audit[6696]: USER_END pid=6696 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:34.512327 systemd[1]: sshd@9-172.24.4.54:22-172.24.4.1:56308.service: Deactivated successfully. May 13 06:58:34.514201 systemd[1]: session-10.scope: Deactivated successfully. May 13 06:58:34.525993 kernel: audit: type=1106 audit(1747119514.507:1686): pid=6696 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:34.527500 systemd-logind[1144]: Session 10 logged out. Waiting for processes to exit. May 13 06:58:34.529087 systemd-logind[1144]: Removed session 10. May 13 06:58:34.508000 audit[6696]: CRED_DISP pid=6696 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:34.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.54:22-172.24.4.1:56308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:58:34.537152 kernel: audit: type=1104 audit(1747119514.508:1687): pid=6696 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:36.618724 systemd[1]: run-containerd-runc-k8s.io-77c826a179699678c835a374be396d626293f654860c5d49017b345319e79d84-runc.d27TEE.mount: Deactivated successfully. May 13 06:58:39.006576 systemd[1]: run-containerd-runc-k8s.io-77c826a179699678c835a374be396d626293f654860c5d49017b345319e79d84-runc.cvGGzU.mount: Deactivated successfully. May 13 06:58:39.518744 systemd[1]: Started sshd@10-172.24.4.54:22-172.24.4.1:51116.service. May 13 06:58:39.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.54:22-172.24.4.1:51116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:58:39.524870 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 06:58:39.525092 kernel: audit: type=1130 audit(1747119519.519:1689): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.54:22-172.24.4.1:51116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:58:40.862000 audit[6769]: USER_ACCT pid=6769 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:40.879981 kernel: audit: type=1101 audit(1747119520.862:1690): pid=6769 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:40.880142 sshd[6769]: Accepted publickey for core from 172.24.4.1 port 51116 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:58:40.880729 sshd[6769]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:58:40.877000 audit[6769]: CRED_ACQ pid=6769 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:40.896984 kernel: audit: type=1103 audit(1747119520.877:1691): pid=6769 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:40.908976 kernel: audit: type=1006 audit(1747119520.877:1692): pid=6769 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 13 06:58:40.877000 audit[6769]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff99028b50 a2=3 a3=0 items=0 ppid=1 pid=6769 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:58:40.928113 kernel: audit: type=1300 audit(1747119520.877:1692): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff99028b50 a2=3 a3=0 items=0 ppid=1 pid=6769 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:58:40.928202 kernel: audit: type=1327 audit(1747119520.877:1692): proctitle=737368643A20636F7265205B707269765D May 13 06:58:40.877000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 06:58:40.928801 systemd-logind[1144]: New session 11 of user core. May 13 06:58:40.931471 systemd[1]: Started session-11.scope. May 13 06:58:40.937000 audit[6769]: USER_START pid=6769 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:40.947129 kernel: audit: type=1105 audit(1747119520.937:1693): pid=6769 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:40.941000 audit[6771]: CRED_ACQ pid=6771 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:40.953999 kernel: audit: type=1103 audit(1747119520.941:1694): pid=6771 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:41.652014 sshd[6769]: pam_unix(sshd:session): session closed for user core May 13 06:58:41.653000 audit[6769]: USER_END pid=6769 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:41.661797 systemd[1]: Started sshd@11-172.24.4.54:22-172.24.4.1:51128.service. May 13 06:58:41.673045 kernel: audit: type=1106 audit(1747119521.653:1695): pid=6769 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:41.678241 systemd[1]: sshd@10-172.24.4.54:22-172.24.4.1:51116.service: Deactivated successfully. May 13 06:58:41.680335 systemd[1]: session-11.scope: Deactivated successfully. May 13 06:58:41.682749 systemd-logind[1144]: Session 11 logged out. Waiting for processes to exit. May 13 06:58:41.686728 systemd-logind[1144]: Removed session 11. May 13 06:58:41.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.54:22-172.24.4.1:51128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:58:41.701019 kernel: audit: type=1130 audit(1747119521.673:1696): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.54:22-172.24.4.1:51128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:58:41.673000 audit[6769]: CRED_DISP pid=6769 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:41.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.54:22-172.24.4.1:51116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:58:43.019000 audit[6781]: USER_ACCT pid=6781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:43.024178 sshd[6781]: Accepted publickey for core from 172.24.4.1 port 51128 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:58:43.026494 sshd[6781]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:58:43.024000 audit[6781]: CRED_ACQ pid=6781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:43.024000 audit[6781]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc567a74f0 a2=3 a3=0 items=0 ppid=1 pid=6781 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:58:43.024000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 06:58:43.037769 systemd-logind[1144]: New session 12 of user core. May 13 06:58:43.038970 systemd[1]: Started session-12.scope. May 13 06:58:43.052000 audit[6781]: USER_START pid=6781 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:43.055000 audit[6784]: CRED_ACQ pid=6784 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:43.945783 sshd[6781]: pam_unix(sshd:session): session closed for user core May 13 06:58:43.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.54:22-172.24.4.1:34380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:58:43.949688 systemd[1]: Started sshd@12-172.24.4.54:22-172.24.4.1:34380.service. May 13 06:58:43.974000 audit[6781]: USER_END pid=6781 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:43.974000 audit[6781]: CRED_DISP pid=6781 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:43.976792 systemd[1]: sshd@11-172.24.4.54:22-172.24.4.1:51128.service: Deactivated successfully. May 13 06:58:43.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.54:22-172.24.4.1:51128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:58:43.978455 systemd[1]: session-12.scope: Deactivated successfully. May 13 06:58:43.979198 systemd-logind[1144]: Session 12 logged out. Waiting for processes to exit. May 13 06:58:43.982498 systemd-logind[1144]: Removed session 12. May 13 06:58:45.367148 kernel: kauditd_printk_skb: 13 callbacks suppressed May 13 06:58:45.367416 kernel: audit: type=1101 audit(1747119525.347:1708): pid=6804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:45.347000 audit[6804]: USER_ACCT pid=6804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:45.367685 sshd[6804]: Accepted publickey for core from 172.24.4.1 port 34380 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:58:45.367000 audit[6804]: CRED_ACQ pid=6804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:45.369207 sshd[6804]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:58:45.384246 kernel: audit: type=1103 audit(1747119525.367:1709): pid=6804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:45.384373 kernel: audit: type=1006 audit(1747119525.367:1710): pid=6804 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 13 06:58:45.394511 kernel: audit: type=1300 audit(1747119525.367:1710): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffede475040 a2=3 a3=0 items=0 ppid=1 pid=6804 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:58:45.367000 audit[6804]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffede475040 a2=3 a3=0 items=0 ppid=1 pid=6804 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:58:45.400664 systemd[1]: Started session-13.scope. May 13 06:58:45.402669 systemd-logind[1144]: New session 13 of user core. May 13 06:58:45.367000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 06:58:45.425074 kernel: audit: type=1327 audit(1747119525.367:1710): proctitle=737368643A20636F7265205B707269765D May 13 06:58:45.425000 audit[6804]: USER_START pid=6804 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:45.434059 kernel: audit: type=1105 audit(1747119525.425:1711): pid=6804 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:45.434199 kernel: audit: type=1103 audit(1747119525.429:1712): pid=6807 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:45.429000 audit[6807]: CRED_ACQ pid=6807 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:46.091478 sshd[6804]: pam_unix(sshd:session): session closed for user core May 13 06:58:46.093000 audit[6804]: USER_END pid=6804 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:46.117955 kernel: audit: type=1106 audit(1747119526.093:1713): pid=6804 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:46.118199 kernel: audit: type=1104 audit(1747119526.093:1714): pid=6804 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:46.093000 audit[6804]: CRED_DISP pid=6804 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:46.113506 systemd[1]: sshd@12-172.24.4.54:22-172.24.4.1:34380.service: Deactivated successfully. May 13 06:58:46.115341 systemd[1]: session-13.scope: Deactivated successfully. May 13 06:58:46.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.54:22-172.24.4.1:34380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:58:46.130706 systemd-logind[1144]: Session 13 logged out. Waiting for processes to exit. May 13 06:58:46.144324 kernel: audit: type=1131 audit(1747119526.113:1715): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.54:22-172.24.4.1:34380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:58:46.145892 systemd-logind[1144]: Removed session 13. May 13 06:58:51.147813 systemd[1]: Started sshd@13-172.24.4.54:22-172.24.4.1:34390.service. May 13 06:58:51.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.54:22-172.24.4.1:34390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:58:51.157943 kernel: audit: type=1130 audit(1747119531.150:1716): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.54:22-172.24.4.1:34390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:58:52.447000 audit[6826]: USER_ACCT pid=6826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:52.464802 sshd[6826]: Accepted publickey for core from 172.24.4.1 port 34390 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:58:52.465505 kernel: audit: type=1101 audit(1747119532.447:1717): pid=6826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:52.466335 sshd[6826]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:58:52.463000 audit[6826]: CRED_ACQ pid=6826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:52.481989 kernel: audit: type=1103 audit(1747119532.463:1718): pid=6826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:52.464000 audit[6826]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1806b590 a2=3 a3=0 items=0 ppid=1 pid=6826 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:58:52.508625 kernel: audit: type=1006 audit(1747119532.464:1719): pid=6826 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 13 06:58:52.508775 kernel: audit: type=1300 audit(1747119532.464:1719): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1806b590 a2=3 a3=0 items=0 ppid=1 pid=6826 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:58:52.464000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 06:58:52.515982 kernel: audit: type=1327 audit(1747119532.464:1719): proctitle=737368643A20636F7265205B707269765D May 13 06:58:52.524127 systemd-logind[1144]: New session 14 of user core. May 13 06:58:52.526317 systemd[1]: Started session-14.scope. May 13 06:58:52.535000 audit[6826]: USER_START pid=6826 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:52.544105 kernel: audit: type=1105 audit(1747119532.535:1720): pid=6826 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:52.545541 kernel: audit: type=1103 audit(1747119532.543:1721): pid=6828 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:52.543000 audit[6828]: CRED_ACQ pid=6828 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:53.253520 sshd[6826]: pam_unix(sshd:session): session closed for user core May 13 06:58:53.255000 audit[6826]: USER_END pid=6826 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:53.259823 systemd[1]: sshd@13-172.24.4.54:22-172.24.4.1:34390.service: Deactivated successfully. May 13 06:58:53.261590 systemd[1]: session-14.scope: Deactivated successfully. May 13 06:58:53.273984 kernel: audit: type=1106 audit(1747119533.255:1722): pid=6826 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:53.255000 audit[6826]: CRED_DISP pid=6826 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:53.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.54:22-172.24.4.1:34390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:58:53.289347 systemd-logind[1144]: Session 14 logged out. Waiting for processes to exit. May 13 06:58:53.290005 kernel: audit: type=1104 audit(1747119533.255:1723): pid=6826 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:53.291496 systemd-logind[1144]: Removed session 14. May 13 06:58:58.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.54:22-172.24.4.1:58114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:58:58.276243 systemd[1]: Started sshd@14-172.24.4.54:22-172.24.4.1:58114.service. May 13 06:58:58.279995 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 06:58:58.280100 kernel: audit: type=1130 audit(1747119538.275:1725): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.54:22-172.24.4.1:58114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:58:59.504127 sshd[6840]: Accepted publickey for core from 172.24.4.1 port 58114 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:58:59.502000 audit[6840]: USER_ACCT pid=6840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:59.520216 kernel: audit: type=1101 audit(1747119539.502:1726): pid=6840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:59.535312 kernel: audit: type=1103 audit(1747119539.519:1727): pid=6840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:59.519000 audit[6840]: CRED_ACQ pid=6840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:59.521322 sshd[6840]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:58:59.545042 kernel: audit: type=1006 audit(1747119539.519:1728): pid=6840 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 13 06:58:59.519000 audit[6840]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4734d830 a2=3 a3=0 items=0 ppid=1 pid=6840 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:58:59.519000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 06:58:59.568020 kernel: audit: type=1300 audit(1747119539.519:1728): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4734d830 a2=3 a3=0 items=0 ppid=1 pid=6840 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:58:59.568218 kernel: audit: type=1327 audit(1747119539.519:1728): proctitle=737368643A20636F7265205B707269765D May 13 06:58:59.578620 systemd-logind[1144]: New session 15 of user core. May 13 06:58:59.580069 systemd[1]: Started session-15.scope. May 13 06:58:59.598000 audit[6840]: USER_START pid=6840 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:59.620450 kernel: audit: type=1105 audit(1747119539.598:1729): pid=6840 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:59.620000 audit[6842]: CRED_ACQ pid=6842 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:58:59.636058 kernel: audit: type=1103 audit(1747119539.620:1730): pid=6842 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:00.377416 sshd[6840]: pam_unix(sshd:session): session closed for user core May 13 06:59:00.378000 audit[6840]: USER_END pid=6840 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:00.382350 systemd[1]: sshd@14-172.24.4.54:22-172.24.4.1:58114.service: Deactivated successfully. May 13 06:59:00.383871 systemd[1]: session-15.scope: Deactivated successfully. May 13 06:59:00.378000 audit[6840]: CRED_DISP pid=6840 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:00.393471 kernel: audit: type=1106 audit(1747119540.378:1731): pid=6840 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:00.393757 kernel: audit: type=1104 audit(1747119540.378:1732): pid=6840 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:00.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.54:22-172.24.4.1:58114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:00.393885 systemd-logind[1144]: Session 15 logged out. Waiting for processes to exit. May 13 06:59:00.395085 systemd-logind[1144]: Removed session 15. May 13 06:59:05.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.54:22-172.24.4.1:47028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:05.397386 systemd[1]: Started sshd@15-172.24.4.54:22-172.24.4.1:47028.service. May 13 06:59:05.401183 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 06:59:05.401381 kernel: audit: type=1130 audit(1747119545.396:1734): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.54:22-172.24.4.1:47028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:06.741000 audit[6852]: USER_ACCT pid=6852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:06.743101 sshd[6852]: Accepted publickey for core from 172.24.4.1 port 47028 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:59:06.760894 kernel: audit: type=1101 audit(1747119546.741:1735): pid=6852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:06.768000 audit[6852]: CRED_ACQ pid=6852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:06.777400 sshd[6852]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:59:06.784978 kernel: audit: type=1103 audit(1747119546.768:1736): pid=6852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:06.796075 kernel: audit: type=1006 audit(1747119546.775:1737): pid=6852 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 13 06:59:06.796333 kernel: audit: type=1300 audit(1747119546.775:1737): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcac74f090 a2=3 a3=0 items=0 ppid=1 pid=6852 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:06.775000 audit[6852]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcac74f090 a2=3 a3=0 items=0 ppid=1 pid=6852 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:06.808839 systemd[1]: Started session-16.scope. May 13 06:59:06.775000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 06:59:06.811566 systemd-logind[1144]: New session 16 of user core. May 13 06:59:06.815969 kernel: audit: type=1327 audit(1747119546.775:1737): proctitle=737368643A20636F7265205B707269765D May 13 06:59:06.822000 audit[6852]: USER_START pid=6852 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:06.824000 audit[6854]: CRED_ACQ pid=6854 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:06.836307 kernel: audit: type=1105 audit(1747119546.822:1738): pid=6852 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:06.836434 kernel: audit: type=1103 audit(1747119546.824:1739): pid=6854 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:07.648331 sshd[6852]: pam_unix(sshd:session): session closed for user core May 13 06:59:07.650000 audit[6852]: USER_END pid=6852 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:07.657208 systemd[1]: Started sshd@16-172.24.4.54:22-172.24.4.1:47044.service. May 13 06:59:07.673026 kernel: audit: type=1106 audit(1747119547.650:1740): pid=6852 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:07.658461 systemd[1]: sshd@15-172.24.4.54:22-172.24.4.1:47028.service: Deactivated successfully. May 13 06:59:07.672353 systemd[1]: session-16.scope: Deactivated successfully. May 13 06:59:07.651000 audit[6852]: CRED_DISP pid=6852 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:07.695491 systemd-logind[1144]: Session 16 logged out. Waiting for processes to exit. May 13 06:59:07.696022 kernel: audit: type=1104 audit(1747119547.651:1741): pid=6852 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:07.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.54:22-172.24.4.1:47044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:07.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.54:22-172.24.4.1:47028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:07.701021 systemd-logind[1144]: Removed session 16. May 13 06:59:08.014639 systemd[1]: run-containerd-runc-k8s.io-d10c6ca480ef1b90e96f35f701895afcc8e95210bedd37648a0403a4986d45d1-runc.jQCtMx.mount: Deactivated successfully. May 13 06:59:09.004000 audit[6863]: USER_ACCT pid=6863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:09.005992 systemd[1]: run-containerd-runc-k8s.io-77c826a179699678c835a374be396d626293f654860c5d49017b345319e79d84-runc.ihiert.mount: Deactivated successfully. May 13 06:59:09.007000 audit[6863]: CRED_ACQ pid=6863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:09.007000 audit[6863]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc386b3db0 a2=3 a3=0 items=0 ppid=1 pid=6863 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:09.007000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 06:59:09.010534 sshd[6863]: Accepted publickey for core from 172.24.4.1 port 47044 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:59:09.013606 sshd[6863]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:59:09.026572 systemd[1]: Started session-17.scope. May 13 06:59:09.028529 systemd-logind[1144]: New session 17 of user core. May 13 06:59:09.039000 audit[6863]: USER_START pid=6863 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:09.043000 audit[6904]: CRED_ACQ pid=6904 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:10.297282 sshd[6863]: pam_unix(sshd:session): session closed for user core May 13 06:59:10.299000 audit[6863]: USER_END pid=6863 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:10.299000 audit[6863]: CRED_DISP pid=6863 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:10.306161 systemd[1]: Started sshd@17-172.24.4.54:22-172.24.4.1:47050.service. May 13 06:59:10.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.54:22-172.24.4.1:47050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:10.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.54:22-172.24.4.1:47044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:10.309548 systemd[1]: sshd@16-172.24.4.54:22-172.24.4.1:47044.service: Deactivated successfully. May 13 06:59:10.311802 systemd[1]: session-17.scope: Deactivated successfully. May 13 06:59:10.315124 systemd-logind[1144]: Session 17 logged out. Waiting for processes to exit. May 13 06:59:10.318533 systemd-logind[1144]: Removed session 17. May 13 06:59:10.999019 kernel: kauditd_printk_skb: 13 callbacks suppressed May 13 06:59:10.999441 kernel: audit: type=1400 audit(1747119550.990:1753): avc: denied { watch } for pid=4187 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_54_48.3599752594/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c633,c794 tclass=file permissive=0 May 13 06:59:10.990000 audit[4187]: AVC avc: denied { watch } for pid=4187 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_54_48.3599752594/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c633,c794 tclass=file permissive=0 May 13 06:59:10.990000 audit[4187]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c002eb5c80 a2=fc6 a3=0 items=0 ppid=3642 pid=4187 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 key=(null) May 13 06:59:11.032248 kernel: audit: type=1300 audit(1747119550.990:1753): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c002eb5c80 a2=fc6 a3=0 items=0 ppid=3642 pid=4187 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 key=(null) May 13 06:59:10.990000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 06:59:11.049415 kernel: audit: type=1327 audit(1747119550.990:1753): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 06:59:11.432000 audit[6914]: USER_ACCT pid=6914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:11.435612 sshd[6914]: Accepted publickey for core from 172.24.4.1 port 47050 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:59:11.449976 kernel: audit: type=1101 audit(1747119551.432:1754): pid=6914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:11.450472 sshd[6914]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:59:11.448000 audit[6914]: CRED_ACQ pid=6914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:11.477694 kernel: audit: type=1103 audit(1747119551.448:1755): pid=6914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:11.477880 kernel: audit: type=1006 audit(1747119551.448:1756): pid=6914 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 13 06:59:11.448000 audit[6914]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea262d3a0 a2=3 a3=0 items=0 ppid=1 pid=6914 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:11.448000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 06:59:11.499992 kernel: audit: type=1300 audit(1747119551.448:1756): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea262d3a0 a2=3 a3=0 items=0 ppid=1 pid=6914 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:11.500125 kernel: audit: type=1327 audit(1747119551.448:1756): proctitle=737368643A20636F7265205B707269765D May 13 06:59:11.504039 systemd-logind[1144]: New session 18 of user core. May 13 06:59:11.506244 systemd[1]: Started session-18.scope. May 13 06:59:11.516000 audit[6914]: USER_START pid=6914 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:11.522000 audit[6917]: CRED_ACQ pid=6917 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:11.534374 kernel: audit: type=1105 audit(1747119551.516:1757): pid=6914 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:11.534508 kernel: audit: type=1103 audit(1747119551.522:1758): pid=6917 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:13.093000 audit[4309]: AVC avc: denied { watch } for pid=4309 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_55_11.4127886896/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c848 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c416,c848 tclass=file permissive=0 May 13 06:59:13.093000 audit[4309]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f48860 a2=fc6 a3=0 items=0 ppid=4255 pid=4309 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c848 key=(null) May 13 06:59:13.093000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 06:59:13.354000 audit[6926]: NETFILTER_CFG table=filter:150 family=2 entries=20 op=nft_register_rule pid=6926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:59:13.354000 audit[6926]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffff1389c80 a2=0 a3=7ffff1389c6c items=0 ppid=2110 pid=6926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:13.354000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:59:13.359000 audit[6926]: NETFILTER_CFG table=nat:151 family=2 entries=22 op=nft_register_rule pid=6926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:59:13.359000 audit[6926]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffff1389c80 a2=0 a3=0 items=0 ppid=2110 pid=6926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:13.359000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:59:13.397000 audit[6928]: NETFILTER_CFG table=filter:152 family=2 entries=32 op=nft_register_rule pid=6928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:59:13.397000 audit[6928]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc900141e0 a2=0 a3=7ffc900141cc items=0 ppid=2110 pid=6928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:13.397000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:59:13.402000 audit[6928]: NETFILTER_CFG table=nat:153 family=2 entries=22 op=nft_register_rule pid=6928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:59:13.402000 audit[6928]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc900141e0 a2=0 a3=0 items=0 ppid=2110 pid=6928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:13.402000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:59:13.509279 systemd[1]: Started sshd@18-172.24.4.54:22-172.24.4.1:34008.service. May 13 06:59:13.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.54:22-172.24.4.1:34008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:13.516376 sshd[6914]: pam_unix(sshd:session): session closed for user core May 13 06:59:13.517000 audit[6914]: USER_END pid=6914 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:13.517000 audit[6914]: CRED_DISP pid=6914 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:13.520197 systemd-logind[1144]: Session 18 logged out. Waiting for processes to exit. May 13 06:59:13.521990 systemd[1]: sshd@17-172.24.4.54:22-172.24.4.1:47050.service: Deactivated successfully. May 13 06:59:13.522810 systemd[1]: session-18.scope: Deactivated successfully. May 13 06:59:13.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.54:22-172.24.4.1:47050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:13.524547 systemd-logind[1144]: Removed session 18. May 13 06:59:14.469000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:59:14.469000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:59:14.469000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002d4fae0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:59:14.469000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:59:14.469000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002788b10 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:59:14.469000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:59:14.798000 audit[6930]: USER_ACCT pid=6930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:14.804241 sshd[6930]: Accepted publickey for core from 172.24.4.1 port 34008 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:59:14.802000 audit[6930]: CRED_ACQ pid=6930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:14.802000 audit[6930]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee5757d90 a2=3 a3=0 items=0 ppid=1 pid=6930 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:14.802000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 06:59:14.805590 sshd[6930]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:59:14.811000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:59:14.811000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0104f4840 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:59:14.811000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:59:14.813000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:59:14.813000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c01068f1d0 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:59:14.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:59:14.814000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:59:14.814000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c01068f200 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:59:14.814000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:59:14.814000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:59:14.814000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c011d056e0 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:59:14.814000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:59:14.827118 systemd-logind[1144]: New session 19 of user core. May 13 06:59:14.828621 systemd[1]: Started session-19.scope. May 13 06:59:14.848000 audit[6930]: USER_START pid=6930 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:14.852000 audit[6933]: CRED_ACQ pid=6933 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:14.869000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:59:14.869000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c01068f6b0 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:59:14.869000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:59:14.870000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:59:14.870000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c011d058e0 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 06:59:14.870000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 06:59:15.872657 sshd[6930]: pam_unix(sshd:session): session closed for user core May 13 06:59:15.878000 audit[6930]: USER_END pid=6930 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:15.878000 audit[6930]: CRED_DISP pid=6930 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:15.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.54:22-172.24.4.1:34024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:15.885272 systemd[1]: Started sshd@19-172.24.4.54:22-172.24.4.1:34024.service. May 13 06:59:15.888527 systemd[1]: sshd@18-172.24.4.54:22-172.24.4.1:34008.service: Deactivated successfully. May 13 06:59:15.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.54:22-172.24.4.1:34008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:15.891700 systemd[1]: session-19.scope: Deactivated successfully. May 13 06:59:15.895277 systemd-logind[1144]: Session 19 logged out. Waiting for processes to exit. May 13 06:59:15.898508 systemd-logind[1144]: Removed session 19. May 13 06:59:17.102000 audit[6940]: USER_ACCT pid=6940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:17.105909 sshd[6940]: Accepted publickey for core from 172.24.4.1 port 34024 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:59:17.107088 kernel: kauditd_printk_skb: 54 callbacks suppressed May 13 06:59:17.107412 kernel: audit: type=1101 audit(1747119557.102:1785): pid=6940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:17.108792 sshd[6940]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:59:17.106000 audit[6940]: CRED_ACQ pid=6940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:17.138560 systemd-logind[1144]: New session 20 of user core. May 13 06:59:17.143396 kernel: audit: type=1103 audit(1747119557.106:1786): pid=6940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:17.143519 kernel: audit: type=1006 audit(1747119557.106:1787): pid=6940 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 May 13 06:59:17.142096 systemd[1]: Started session-20.scope. May 13 06:59:17.156387 kernel: audit: type=1300 audit(1747119557.106:1787): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef4698360 a2=3 a3=0 items=0 ppid=1 pid=6940 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:17.106000 audit[6940]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef4698360 a2=3 a3=0 items=0 ppid=1 pid=6940 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:17.106000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 06:59:17.176776 kernel: audit: type=1327 audit(1747119557.106:1787): proctitle=737368643A20636F7265205B707269765D May 13 06:59:17.175000 audit[6940]: USER_START pid=6940 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:17.186955 kernel: audit: type=1105 audit(1747119557.175:1788): pid=6940 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:17.185000 audit[6943]: CRED_ACQ pid=6943 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:17.194938 kernel: audit: type=1103 audit(1747119557.185:1789): pid=6943 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:17.802407 sshd[6940]: pam_unix(sshd:session): session closed for user core May 13 06:59:17.804000 audit[6940]: USER_END pid=6940 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:17.804000 audit[6940]: CRED_DISP pid=6940 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:17.828228 systemd-logind[1144]: Session 20 logged out. Waiting for processes to exit. May 13 06:59:17.831800 systemd[1]: sshd@19-172.24.4.54:22-172.24.4.1:34024.service: Deactivated successfully. May 13 06:59:17.833718 systemd[1]: session-20.scope: Deactivated successfully. May 13 06:59:17.837890 systemd-logind[1144]: Removed session 20. May 13 06:59:17.843518 kernel: audit: type=1106 audit(1747119557.804:1790): pid=6940 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:17.844166 kernel: audit: type=1104 audit(1747119557.804:1791): pid=6940 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:17.844283 kernel: audit: type=1131 audit(1747119557.830:1792): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.54:22-172.24.4.1:34024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:17.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.54:22-172.24.4.1:34024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:22.808725 systemd[1]: Started sshd@20-172.24.4.54:22-172.24.4.1:34028.service. May 13 06:59:22.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.54:22-172.24.4.1:34028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:22.820998 kernel: audit: type=1130 audit(1747119562.813:1793): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.54:22-172.24.4.1:34028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:22.835000 audit[6957]: NETFILTER_CFG table=filter:154 family=2 entries=20 op=nft_register_rule pid=6957 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:59:22.835000 audit[6957]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff166b0c10 a2=0 a3=7fff166b0bfc items=0 ppid=2110 pid=6957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:22.848278 kernel: audit: type=1325 audit(1747119562.835:1794): table=filter:154 family=2 entries=20 op=nft_register_rule pid=6957 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:59:22.848381 kernel: audit: type=1300 audit(1747119562.835:1794): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff166b0c10 a2=0 a3=7fff166b0bfc items=0 ppid=2110 pid=6957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:22.835000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:59:22.853956 kernel: audit: type=1327 audit(1747119562.835:1794): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:59:22.858000 audit[6957]: NETFILTER_CFG table=nat:155 family=2 entries=106 op=nft_register_chain pid=6957 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:59:22.858000 audit[6957]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff166b0c10 a2=0 a3=7fff166b0bfc items=0 ppid=2110 pid=6957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:22.871046 kernel: audit: type=1325 audit(1747119562.858:1795): table=nat:155 family=2 entries=106 op=nft_register_chain pid=6957 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 06:59:22.871229 kernel: audit: type=1300 audit(1747119562.858:1795): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff166b0c10 a2=0 a3=7fff166b0bfc items=0 ppid=2110 pid=6957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:22.871258 kernel: audit: type=1327 audit(1747119562.858:1795): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:59:22.858000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 06:59:23.672000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:59:23.679983 kernel: audit: type=1400 audit(1747119563.672:1796): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:59:23.680157 kernel: audit: type=1300 audit(1747119563.672:1796): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011f3740 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:59:23.672000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011f3740 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:59:23.672000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:59:23.695014 kernel: audit: type=1327 audit(1747119563.672:1796): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:59:23.679000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:59:23.679000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011f3760 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:59:23.679000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:59:23.679000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:59:23.679000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011f3900 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:59:23.679000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:59:23.687000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 06:59:23.687000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0020e5000 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 06:59:23.687000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 06:59:24.112000 audit[6955]: USER_ACCT pid=6955 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:24.113975 sshd[6955]: Accepted publickey for core from 172.24.4.1 port 34028 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:59:24.115000 audit[6955]: CRED_ACQ pid=6955 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:24.115000 audit[6955]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4af1c010 a2=3 a3=0 items=0 ppid=1 pid=6955 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:24.115000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 06:59:24.117742 sshd[6955]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:59:24.128495 systemd[1]: Started session-21.scope. May 13 06:59:24.129866 systemd-logind[1144]: New session 21 of user core. May 13 06:59:24.142000 audit[6955]: USER_START pid=6955 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:24.145000 audit[6959]: CRED_ACQ pid=6959 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:24.861723 sshd[6955]: pam_unix(sshd:session): session closed for user core May 13 06:59:24.863000 audit[6955]: USER_END pid=6955 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:24.864000 audit[6955]: CRED_DISP pid=6955 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:24.867904 systemd[1]: sshd@20-172.24.4.54:22-172.24.4.1:34028.service: Deactivated successfully. May 13 06:59:24.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.54:22-172.24.4.1:34028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:24.870117 systemd[1]: session-21.scope: Deactivated successfully. May 13 06:59:24.871741 systemd-logind[1144]: Session 21 logged out. Waiting for processes to exit. May 13 06:59:24.874693 systemd-logind[1144]: Removed session 21. May 13 06:59:29.873220 systemd[1]: Started sshd@21-172.24.4.54:22-172.24.4.1:55612.service. May 13 06:59:29.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.54:22-172.24.4.1:55612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:29.879055 kernel: kauditd_printk_skb: 19 callbacks suppressed May 13 06:59:29.879254 kernel: audit: type=1130 audit(1747119569.873:1808): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.54:22-172.24.4.1:55612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:31.163000 audit[6970]: USER_ACCT pid=6970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:31.165186 sshd[6970]: Accepted publickey for core from 172.24.4.1 port 55612 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:59:31.180977 kernel: audit: type=1101 audit(1747119571.163:1809): pid=6970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:31.183000 audit[6970]: CRED_ACQ pid=6970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:31.199971 kernel: audit: type=1103 audit(1747119571.183:1810): pid=6970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:31.200969 sshd[6970]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:59:31.227375 kernel: audit: type=1006 audit(1747119571.183:1811): pid=6970 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 13 06:59:31.227544 kernel: audit: type=1300 audit(1747119571.183:1811): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd0c85a70 a2=3 a3=0 items=0 ppid=1 pid=6970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:31.183000 audit[6970]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd0c85a70 a2=3 a3=0 items=0 ppid=1 pid=6970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:31.214106 systemd[1]: Started session-22.scope. May 13 06:59:31.215845 systemd-logind[1144]: New session 22 of user core. May 13 06:59:31.183000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 06:59:31.238368 kernel: audit: type=1327 audit(1747119571.183:1811): proctitle=737368643A20636F7265205B707269765D May 13 06:59:31.238556 kernel: audit: type=1105 audit(1747119571.236:1812): pid=6970 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:31.236000 audit[6970]: USER_START pid=6970 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:31.236000 audit[6972]: CRED_ACQ pid=6972 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:31.262946 kernel: audit: type=1103 audit(1747119571.236:1813): pid=6972 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:32.041420 sshd[6970]: pam_unix(sshd:session): session closed for user core May 13 06:59:32.042000 audit[6970]: USER_END pid=6970 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:32.044000 audit[6970]: CRED_DISP pid=6970 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:32.064521 systemd-logind[1144]: Session 22 logged out. Waiting for processes to exit. May 13 06:59:32.068163 systemd[1]: sshd@21-172.24.4.54:22-172.24.4.1:55612.service: Deactivated successfully. May 13 06:59:32.069967 systemd[1]: session-22.scope: Deactivated successfully. May 13 06:59:32.073829 systemd-logind[1144]: Removed session 22. May 13 06:59:32.075285 kernel: audit: type=1106 audit(1747119572.042:1814): pid=6970 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:32.076113 kernel: audit: type=1104 audit(1747119572.044:1815): pid=6970 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:32.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.54:22-172.24.4.1:55612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:36.616410 systemd[1]: run-containerd-runc-k8s.io-77c826a179699678c835a374be396d626293f654860c5d49017b345319e79d84-runc.cYny7S.mount: Deactivated successfully. May 13 06:59:37.051898 systemd[1]: Started sshd@22-172.24.4.54:22-172.24.4.1:57424.service. May 13 06:59:37.069857 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 06:59:37.070085 kernel: audit: type=1130 audit(1747119577.051:1817): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.54:22-172.24.4.1:57424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:37.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.54:22-172.24.4.1:57424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:38.181000 audit[7000]: USER_ACCT pid=7000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:38.184047 sshd[7000]: Accepted publickey for core from 172.24.4.1 port 57424 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:59:38.198987 kernel: audit: type=1101 audit(1747119578.181:1818): pid=7000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:38.199000 audit[7000]: CRED_ACQ pid=7000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:38.216154 kernel: audit: type=1103 audit(1747119578.199:1819): pid=7000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:38.216236 kernel: audit: type=1006 audit(1747119578.199:1820): pid=7000 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 13 06:59:38.201717 sshd[7000]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:59:38.199000 audit[7000]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4c8a66f0 a2=3 a3=0 items=0 ppid=1 pid=7000 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:38.229585 systemd[1]: Started session-23.scope. May 13 06:59:38.231125 systemd-logind[1144]: New session 23 of user core. May 13 06:59:38.241243 kernel: audit: type=1300 audit(1747119578.199:1820): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4c8a66f0 a2=3 a3=0 items=0 ppid=1 pid=7000 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:38.199000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 06:59:38.247951 kernel: audit: type=1327 audit(1747119578.199:1820): proctitle=737368643A20636F7265205B707269765D May 13 06:59:38.260949 kernel: audit: type=1105 audit(1747119578.252:1821): pid=7000 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:38.252000 audit[7000]: USER_START pid=7000 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:38.253000 audit[7024]: CRED_ACQ pid=7024 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:38.267991 kernel: audit: type=1103 audit(1747119578.253:1822): pid=7024 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:39.002362 systemd[1]: run-containerd-runc-k8s.io-77c826a179699678c835a374be396d626293f654860c5d49017b345319e79d84-runc.uSyiDz.mount: Deactivated successfully. May 13 06:59:39.041246 sshd[7000]: pam_unix(sshd:session): session closed for user core May 13 06:59:39.041000 audit[7000]: USER_END pid=7000 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:39.045486 systemd[1]: sshd@22-172.24.4.54:22-172.24.4.1:57424.service: Deactivated successfully. May 13 06:59:39.046809 systemd[1]: session-23.scope: Deactivated successfully. May 13 06:59:39.049951 kernel: audit: type=1106 audit(1747119579.041:1823): pid=7000 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:39.041000 audit[7000]: CRED_DISP pid=7000 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:39.050623 systemd-logind[1144]: Session 23 logged out. Waiting for processes to exit. May 13 06:59:39.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.54:22-172.24.4.1:57424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:39.057625 kernel: audit: type=1104 audit(1747119579.041:1824): pid=7000 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:39.057143 systemd-logind[1144]: Removed session 23. May 13 06:59:44.058571 systemd[1]: Started sshd@23-172.24.4.54:22-172.24.4.1:38292.service. May 13 06:59:44.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.54:22-172.24.4.1:38292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:44.067633 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 06:59:44.067837 kernel: audit: type=1130 audit(1747119584.059:1826): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.54:22-172.24.4.1:38292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:45.271000 audit[7053]: USER_ACCT pid=7053 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:45.273082 sshd[7053]: Accepted publickey for core from 172.24.4.1 port 38292 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:59:45.291983 kernel: audit: type=1101 audit(1747119585.271:1827): pid=7053 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:45.292618 sshd[7053]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:59:45.290000 audit[7053]: CRED_ACQ pid=7053 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:45.305498 systemd[1]: Started session-24.scope. May 13 06:59:45.308020 systemd-logind[1144]: New session 24 of user core. May 13 06:59:45.329005 kernel: audit: type=1103 audit(1747119585.290:1828): pid=7053 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:45.329193 kernel: audit: type=1006 audit(1747119585.290:1829): pid=7053 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 13 06:59:45.290000 audit[7053]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec300b520 a2=3 a3=0 items=0 ppid=1 pid=7053 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:45.348994 kernel: audit: type=1300 audit(1747119585.290:1829): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec300b520 a2=3 a3=0 items=0 ppid=1 pid=7053 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:45.352350 kernel: audit: type=1327 audit(1747119585.290:1829): proctitle=737368643A20636F7265205B707269765D May 13 06:59:45.352466 kernel: audit: type=1105 audit(1747119585.333:1830): pid=7053 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:45.290000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 06:59:45.333000 audit[7053]: USER_START pid=7053 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:45.359231 kernel: audit: type=1103 audit(1747119585.344:1831): pid=7055 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:45.344000 audit[7055]: CRED_ACQ pid=7055 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:46.040705 sshd[7053]: pam_unix(sshd:session): session closed for user core May 13 06:59:46.042000 audit[7053]: USER_END pid=7053 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:46.062000 kernel: audit: type=1106 audit(1747119586.042:1832): pid=7053 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:46.042000 audit[7053]: CRED_DISP pid=7053 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:46.062479 systemd[1]: sshd@23-172.24.4.54:22-172.24.4.1:38292.service: Deactivated successfully. May 13 06:59:46.064796 systemd[1]: session-24.scope: Deactivated successfully. May 13 06:59:46.066830 systemd-logind[1144]: Session 24 logged out. Waiting for processes to exit. May 13 06:59:46.068965 systemd-logind[1144]: Removed session 24. May 13 06:59:46.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.54:22-172.24.4.1:38292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:46.077007 kernel: audit: type=1104 audit(1747119586.042:1833): pid=7053 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:51.054209 systemd[1]: Started sshd@24-172.24.4.54:22-172.24.4.1:38306.service. May 13 06:59:51.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.54:22-172.24.4.1:38306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:51.058973 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 06:59:51.059175 kernel: audit: type=1130 audit(1747119591.053:1835): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.54:22-172.24.4.1:38306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 06:59:52.271000 audit[7065]: USER_ACCT pid=7065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:52.274359 sshd[7065]: Accepted publickey for core from 172.24.4.1 port 38306 ssh2: RSA SHA256:o3qf9BbIw3lN4el61qbJXxqdYr8ihfCj03haQgpGwd0 May 13 06:59:52.289973 kernel: audit: type=1101 audit(1747119592.271:1836): pid=7065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:52.287000 audit[7065]: CRED_ACQ pid=7065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:52.291111 sshd[7065]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 06:59:52.305709 kernel: audit: type=1103 audit(1747119592.287:1837): pid=7065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:52.305853 kernel: audit: type=1006 audit(1747119592.287:1838): pid=7065 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 13 06:59:52.304545 systemd[1]: Started session-25.scope. May 13 06:59:52.309035 systemd-logind[1144]: New session 25 of user core. May 13 06:59:52.287000 audit[7065]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff877caf0 a2=3 a3=0 items=0 ppid=1 pid=7065 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:52.287000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 06:59:52.337453 kernel: audit: type=1300 audit(1747119592.287:1838): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff877caf0 a2=3 a3=0 items=0 ppid=1 pid=7065 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 06:59:52.337691 kernel: audit: type=1327 audit(1747119592.287:1838): proctitle=737368643A20636F7265205B707269765D May 13 06:59:52.337764 kernel: audit: type=1105 audit(1747119592.322:1839): pid=7065 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:52.322000 audit[7065]: USER_START pid=7065 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:52.328000 audit[7067]: CRED_ACQ pid=7067 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:52.361048 kernel: audit: type=1103 audit(1747119592.328:1840): pid=7067 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:53.157584 sshd[7065]: pam_unix(sshd:session): session closed for user core May 13 06:59:53.158000 audit[7065]: USER_END pid=7065 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:53.159000 audit[7065]: CRED_DISP pid=7065 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:53.178579 systemd[1]: sshd@24-172.24.4.54:22-172.24.4.1:38306.service: Deactivated successfully. May 13 06:59:53.180376 systemd[1]: session-25.scope: Deactivated successfully. May 13 06:59:53.184020 systemd-logind[1144]: Session 25 logged out. Waiting for processes to exit. May 13 06:59:53.186439 systemd-logind[1144]: Removed session 25. May 13 06:59:53.191405 kernel: audit: type=1106 audit(1747119593.158:1841): pid=7065 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:53.191649 kernel: audit: type=1104 audit(1747119593.159:1842): pid=7065 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 06:59:53.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.54:22-172.24.4.1:38306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 07:00:10.994000 audit[4187]: AVC avc: denied { watch } for pid=4187 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_54_48.3599752594/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c633,c794 tclass=file permissive=0 May 13 07:00:10.999169 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 07:00:10.999327 kernel: audit: type=1400 audit(1747119610.994:1844): avc: denied { watch } for pid=4187 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_54_48.3599752594/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c633,c794 tclass=file permissive=0 May 13 07:00:10.994000 audit[4187]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001280d40 a2=fc6 a3=0 items=0 ppid=3642 pid=4187 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 key=(null) May 13 07:00:11.040852 kernel: audit: type=1300 audit(1747119610.994:1844): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001280d40 a2=fc6 a3=0 items=0 ppid=3642 pid=4187 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 key=(null) May 13 07:00:11.041172 kernel: audit: type=1327 audit(1747119610.994:1844): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:00:10.994000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:00:13.096000 audit[4309]: AVC avc: denied { watch } for pid=4309 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_55_11.4127886896/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c848 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c416,c848 tclass=file permissive=0 May 13 07:00:13.096000 audit[4309]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f48dc0 a2=fc6 a3=0 items=0 ppid=4255 pid=4309 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c848 key=(null) May 13 07:00:13.134038 kernel: audit: type=1400 audit(1747119613.096:1845): avc: denied { watch } for pid=4309 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_55_11.4127886896/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c848 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c416,c848 tclass=file permissive=0 May 13 07:00:13.134574 kernel: audit: type=1300 audit(1747119613.096:1845): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f48dc0 a2=fc6 a3=0 items=0 ppid=4255 pid=4309 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c848 key=(null) May 13 07:00:13.134676 kernel: audit: type=1327 audit(1747119613.096:1845): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:00:13.096000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:00:14.476000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:00:14.476000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0009734a0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 07:00:14.511707 kernel: audit: type=1400 audit(1747119614.476:1846): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:00:14.511895 kernel: audit: type=1300 audit(1747119614.476:1846): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0009734a0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 07:00:14.476000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:00:14.477000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:00:14.543988 kernel: audit: type=1327 audit(1747119614.476:1846): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:00:14.544155 kernel: audit: type=1400 audit(1747119614.477:1847): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:00:14.477000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0008ea2a0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 07:00:14.477000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:00:14.812000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:00:14.812000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c009ea4cc0 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 07:00:14.812000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 07:00:14.815000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:00:14.815000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c009e53080 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 07:00:14.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 07:00:14.815000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:00:14.815000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00cd809e0 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 07:00:14.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 07:00:14.815000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:00:14.815000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c009ea4cf0 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 07:00:14.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 07:00:14.870000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:00:14.870000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c009ea4d20 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 07:00:14.870000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 07:00:14.870000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:00:14.870000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00cd80a20 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 07:00:14.870000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 07:00:23.679000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:00:23.684068 kernel: kauditd_printk_skb: 20 callbacks suppressed May 13 07:00:23.684342 kernel: audit: type=1400 audit(1747119623.679:1854): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:00:23.682000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:00:23.714086 kernel: audit: type=1400 audit(1747119623.682:1855): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:00:23.714264 kernel: audit: type=1300 audit(1747119623.682:1855): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024ba1a0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 07:00:23.682000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024ba1a0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 07:00:23.682000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:00:23.750080 kernel: audit: type=1327 audit(1747119623.682:1855): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:00:23.682000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:00:23.759898 kernel: audit: type=1400 audit(1747119623.682:1856): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:00:23.760132 kernel: audit: type=1300 audit(1747119623.682:1856): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024ba1c0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 07:00:23.682000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024ba1c0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 07:00:23.682000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:00:23.774064 kernel: audit: type=1327 audit(1747119623.682:1856): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:00:23.774223 kernel: audit: type=1300 audit(1747119623.679:1854): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0025621a0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 07:00:23.679000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0025621a0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 07:00:23.781992 kernel: audit: type=1327 audit(1747119623.679:1854): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:00:23.679000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:00:23.687000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:00:23.794164 kernel: audit: type=1400 audit(1747119623.687:1857): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:00:23.687000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0025621c0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 07:00:23.687000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:00:36.639356 systemd[1]: run-containerd-runc-k8s.io-77c826a179699678c835a374be396d626293f654860c5d49017b345319e79d84-runc.yMWEb6.mount: Deactivated successfully. May 13 07:00:38.047895 systemd[1]: run-containerd-runc-k8s.io-d10c6ca480ef1b90e96f35f701895afcc8e95210bedd37648a0403a4986d45d1-runc.ZimQ4h.mount: Deactivated successfully. May 13 07:00:39.005781 systemd[1]: run-containerd-runc-k8s.io-77c826a179699678c835a374be396d626293f654860c5d49017b345319e79d84-runc.ptLk3R.mount: Deactivated successfully. May 13 07:01:08.032231 systemd[1]: run-containerd-runc-k8s.io-d10c6ca480ef1b90e96f35f701895afcc8e95210bedd37648a0403a4986d45d1-runc.e38rHa.mount: Deactivated successfully. May 13 07:01:08.976230 systemd[1]: run-containerd-runc-k8s.io-77c826a179699678c835a374be396d626293f654860c5d49017b345319e79d84-runc.5XndU5.mount: Deactivated successfully. May 13 07:01:10.998000 audit[4187]: AVC avc: denied { watch } for pid=4187 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_54_48.3599752594/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c633,c794 tclass=file permissive=0 May 13 07:01:11.002968 kernel: kauditd_printk_skb: 2 callbacks suppressed May 13 07:01:11.003357 kernel: audit: type=1400 audit(1747119670.998:1858): avc: denied { watch } for pid=4187 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_54_48.3599752594/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c633,c794 tclass=file permissive=0 May 13 07:01:10.998000 audit[4187]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001ecbec0 a2=fc6 a3=0 items=0 ppid=3642 pid=4187 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 key=(null) May 13 07:01:10.998000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:01:11.055889 kernel: audit: type=1300 audit(1747119670.998:1858): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001ecbec0 a2=fc6 a3=0 items=0 ppid=3642 pid=4187 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c633,c794 key=(null) May 13 07:01:11.056164 kernel: audit: type=1327 audit(1747119670.998:1858): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:01:13.100000 audit[4309]: AVC avc: denied { watch } for pid=4309 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_55_11.4127886896/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c848 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c416,c848 tclass=file permissive=0 May 13 07:01:13.127985 kernel: audit: type=1400 audit(1747119673.100:1859): avc: denied { watch } for pid=4309 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_06_55_11.4127886896/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c416,c848 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c416,c848 tclass=file permissive=0 May 13 07:01:13.128263 kernel: audit: type=1300 audit(1747119673.100:1859): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00104a960 a2=fc6 a3=0 items=0 ppid=4255 pid=4309 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c848 key=(null) May 13 07:01:13.100000 audit[4309]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00104a960 a2=fc6 a3=0 items=0 ppid=4255 pid=4309 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c416,c848 key=(null) May 13 07:01:13.100000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:01:13.163630 kernel: audit: type=1327 audit(1747119673.100:1859): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 07:01:14.479000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:01:14.494981 kernel: audit: type=1400 audit(1747119674.479:1860): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:01:14.479000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:01:14.479000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0027aaba0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 07:01:14.531111 kernel: audit: type=1400 audit(1747119674.479:1861): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:01:14.531349 kernel: audit: type=1300 audit(1747119674.479:1860): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0027aaba0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 07:01:14.479000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:01:14.547886 kernel: audit: type=1327 audit(1747119674.479:1860): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:01:14.479000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011cc7b0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 07:01:14.479000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:01:14.814000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:01:14.814000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00a3f5380 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 07:01:14.814000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 07:01:14.815000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:01:14.815000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00a675e30 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 07:01:14.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 07:01:14.816000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:01:14.816000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00f4e45c0 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 07:01:14.816000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 07:01:14.816000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:01:14.816000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00a675f80 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 07:01:14.816000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 07:01:14.871000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:01:14.871000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00a3f54a0 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 07:01:14.871000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 07:01:14.872000 audit[1804]: AVC avc: denied { watch } for pid=1804 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:01:14.872000 audit[1804]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00f4e4740 a2=fc6 a3=0 items=0 ppid=1633 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c878 key=(null) May 13 07:01:14.872000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3534002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 07:01:23.684000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:01:23.689831 kernel: kauditd_printk_skb: 20 callbacks suppressed May 13 07:01:23.690029 kernel: audit: type=1400 audit(1747119683.684:1868): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:01:23.684000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d09a60 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 07:01:23.726321 kernel: audit: type=1300 audit(1747119683.684:1868): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d09a60 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 07:01:23.726588 kernel: audit: type=1327 audit(1747119683.684:1868): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:01:23.684000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:01:23.686000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:01:23.755211 kernel: audit: type=1400 audit(1747119683.686:1869): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:01:23.755430 kernel: audit: type=1300 audit(1747119683.686:1869): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0027ab2a0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 07:01:23.686000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0027ab2a0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 07:01:23.686000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:01:23.768656 kernel: audit: type=1327 audit(1747119683.686:1869): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:01:23.768832 kernel: audit: type=1400 audit(1747119683.687:1870): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:01:23.687000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:01:23.774240 kernel: audit: type=1300 audit(1747119683.687:1870): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d09aa0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 07:01:23.687000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d09aa0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 07:01:23.781686 kernel: audit: type=1327 audit(1747119683.687:1870): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:01:23.687000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 07:01:23.687000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:01:23.799119 kernel: audit: type=1400 audit(1747119683.687:1871): avc: denied { watch } for pid=1819 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 07:01:23.687000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d09de0 a2=fc6 a3=0 items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c540 key=(null) May 13 07:01:23.687000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269