May 13 08:36:50.984901 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon May 12 23:08:12 -00 2025 May 13 08:36:50.984930 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 08:36:50.984940 kernel: BIOS-provided physical RAM map: May 13 08:36:50.984951 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 13 08:36:50.984958 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 13 08:36:50.984964 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 13 08:36:50.984972 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdcfff] usable May 13 08:36:50.984979 kernel: BIOS-e820: [mem 0x00000000bffdd000-0x00000000bfffffff] reserved May 13 08:36:50.984986 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 13 08:36:50.984992 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 13 08:36:50.984999 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable May 13 08:36:50.985006 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved May 13 08:36:50.985015 kernel: NX (Execute Disable) protection: active May 13 08:36:50.985021 kernel: SMBIOS 3.0.0 present. May 13 08:36:50.985030 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.16.3-debian-1.16.3-2 04/01/2014 May 13 08:36:50.985037 kernel: Hypervisor detected: KVM May 13 08:36:50.985044 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 13 08:36:50.985052 kernel: kvm-clock: cpu 0, msr 67196001, primary cpu clock May 13 08:36:50.985060 kernel: kvm-clock: using sched offset of 3897322704 cycles May 13 08:36:50.985068 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 13 08:36:50.985076 kernel: tsc: Detected 1996.249 MHz processor May 13 08:36:50.985083 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 13 08:36:50.985091 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 13 08:36:50.985098 kernel: last_pfn = 0x140000 max_arch_pfn = 0x400000000 May 13 08:36:50.985106 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 13 08:36:50.985114 kernel: last_pfn = 0xbffdd max_arch_pfn = 0x400000000 May 13 08:36:50.985121 kernel: ACPI: Early table checksum verification disabled May 13 08:36:50.985130 kernel: ACPI: RSDP 0x00000000000F51E0 000014 (v00 BOCHS ) May 13 08:36:50.985138 kernel: ACPI: RSDT 0x00000000BFFE1B65 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 08:36:50.985145 kernel: ACPI: FACP 0x00000000BFFE1A49 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 08:36:50.985153 kernel: ACPI: DSDT 0x00000000BFFE0040 001A09 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 08:36:50.985160 kernel: ACPI: FACS 0x00000000BFFE0000 000040 May 13 08:36:50.985168 kernel: ACPI: APIC 0x00000000BFFE1ABD 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 13 08:36:50.985175 kernel: ACPI: WAET 0x00000000BFFE1B3D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 08:36:50.985183 kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1a49-0xbffe1abc] May 13 08:36:50.985191 kernel: ACPI: Reserving DSDT table memory at [mem 0xbffe0040-0xbffe1a48] May 13 08:36:50.985199 kernel: ACPI: Reserving FACS table memory at [mem 0xbffe0000-0xbffe003f] May 13 08:36:50.985206 kernel: ACPI: Reserving APIC table memory at [mem 0xbffe1abd-0xbffe1b3c] May 13 08:36:50.985213 kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1b3d-0xbffe1b64] May 13 08:36:50.985221 kernel: No NUMA configuration found May 13 08:36:50.985231 kernel: Faking a node at [mem 0x0000000000000000-0x000000013fffffff] May 13 08:36:50.985239 kernel: NODE_DATA(0) allocated [mem 0x13fff7000-0x13fffcfff] May 13 08:36:50.985248 kernel: Zone ranges: May 13 08:36:50.985256 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 13 08:36:50.985263 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 13 08:36:50.985271 kernel: Normal [mem 0x0000000100000000-0x000000013fffffff] May 13 08:36:50.985278 kernel: Movable zone start for each node May 13 08:36:50.985286 kernel: Early memory node ranges May 13 08:36:50.985293 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 13 08:36:50.985301 kernel: node 0: [mem 0x0000000000100000-0x00000000bffdcfff] May 13 08:36:50.985310 kernel: node 0: [mem 0x0000000100000000-0x000000013fffffff] May 13 08:36:50.985318 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000013fffffff] May 13 08:36:50.985326 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 13 08:36:50.985333 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 13 08:36:50.985341 kernel: On node 0, zone Normal: 35 pages in unavailable ranges May 13 08:36:50.985348 kernel: ACPI: PM-Timer IO Port: 0x608 May 13 08:36:50.985356 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 13 08:36:50.985364 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 13 08:36:50.985372 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 13 08:36:50.985381 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 13 08:36:50.985388 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 13 08:36:50.985396 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 13 08:36:50.985404 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 13 08:36:50.985411 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 13 08:36:50.985419 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 13 08:36:50.985427 kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices May 13 08:36:50.985434 kernel: Booting paravirtualized kernel on KVM May 13 08:36:50.985442 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 13 08:36:50.985451 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 13 08:36:50.985459 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 13 08:36:50.985466 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 13 08:36:50.985474 kernel: pcpu-alloc: [0] 0 1 May 13 08:36:50.985481 kernel: kvm-guest: stealtime: cpu 0, msr 13bc1c0c0 May 13 08:36:50.985489 kernel: kvm-guest: PV spinlocks disabled, no host support May 13 08:36:50.985496 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1031901 May 13 08:36:50.985504 kernel: Policy zone: Normal May 13 08:36:50.985513 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 08:36:50.985523 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 13 08:36:50.985530 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 13 08:36:50.985538 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 13 08:36:50.985546 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 13 08:36:50.985554 kernel: Memory: 3968276K/4193772K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 225236K reserved, 0K cma-reserved) May 13 08:36:50.985562 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 13 08:36:50.985569 kernel: ftrace: allocating 34584 entries in 136 pages May 13 08:36:50.985577 kernel: ftrace: allocated 136 pages with 2 groups May 13 08:36:50.985586 kernel: rcu: Hierarchical RCU implementation. May 13 08:36:50.985595 kernel: rcu: RCU event tracing is enabled. May 13 08:36:50.985603 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 13 08:36:50.985610 kernel: Rude variant of Tasks RCU enabled. May 13 08:36:50.985618 kernel: Tracing variant of Tasks RCU enabled. May 13 08:36:50.985626 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 13 08:36:50.985633 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 13 08:36:50.985641 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 13 08:36:50.985649 kernel: Console: colour VGA+ 80x25 May 13 08:36:50.985658 kernel: printk: console [tty0] enabled May 13 08:36:50.985665 kernel: printk: console [ttyS0] enabled May 13 08:36:50.985673 kernel: ACPI: Core revision 20210730 May 13 08:36:50.985680 kernel: APIC: Switch to symmetric I/O mode setup May 13 08:36:50.985688 kernel: x2apic enabled May 13 08:36:50.985696 kernel: Switched APIC routing to physical x2apic. May 13 08:36:50.985703 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 13 08:36:50.985711 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 13 08:36:50.985719 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) May 13 08:36:50.985728 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 May 13 08:36:50.985736 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 May 13 08:36:50.985744 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 13 08:36:50.985751 kernel: Spectre V2 : Mitigation: Retpolines May 13 08:36:50.985759 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 13 08:36:50.985766 kernel: Speculative Store Bypass: Vulnerable May 13 08:36:50.985774 kernel: x86/fpu: x87 FPU will use FXSAVE May 13 08:36:50.985782 kernel: Freeing SMP alternatives memory: 32K May 13 08:36:50.985804 kernel: pid_max: default: 32768 minimum: 301 May 13 08:36:50.985813 kernel: LSM: Security Framework initializing May 13 08:36:50.985821 kernel: SELinux: Initializing. May 13 08:36:50.985829 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 08:36:50.985836 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 08:36:50.985844 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) May 13 08:36:50.985852 kernel: Performance Events: AMD PMU driver. May 13 08:36:50.985865 kernel: ... version: 0 May 13 08:36:50.985875 kernel: ... bit width: 48 May 13 08:36:50.985882 kernel: ... generic registers: 4 May 13 08:36:50.985890 kernel: ... value mask: 0000ffffffffffff May 13 08:36:50.985898 kernel: ... max period: 00007fffffffffff May 13 08:36:50.985906 kernel: ... fixed-purpose events: 0 May 13 08:36:50.985916 kernel: ... event mask: 000000000000000f May 13 08:36:50.985924 kernel: signal: max sigframe size: 1440 May 13 08:36:50.985932 kernel: rcu: Hierarchical SRCU implementation. May 13 08:36:50.985940 kernel: smp: Bringing up secondary CPUs ... May 13 08:36:50.985948 kernel: x86: Booting SMP configuration: May 13 08:36:50.985957 kernel: .... node #0, CPUs: #1 May 13 08:36:50.985965 kernel: kvm-clock: cpu 1, msr 67196041, secondary cpu clock May 13 08:36:50.985974 kernel: kvm-guest: stealtime: cpu 1, msr 13bd1c0c0 May 13 08:36:50.985981 kernel: smp: Brought up 1 node, 2 CPUs May 13 08:36:50.985989 kernel: smpboot: Max logical packages: 2 May 13 08:36:50.985998 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) May 13 08:36:50.986005 kernel: devtmpfs: initialized May 13 08:36:50.986013 kernel: x86/mm: Memory block size: 128MB May 13 08:36:50.986022 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 13 08:36:50.986032 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 13 08:36:50.986040 kernel: pinctrl core: initialized pinctrl subsystem May 13 08:36:50.986048 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 13 08:36:50.986056 kernel: audit: initializing netlink subsys (disabled) May 13 08:36:50.986064 kernel: audit: type=2000 audit(1747125410.314:1): state=initialized audit_enabled=0 res=1 May 13 08:36:50.986072 kernel: thermal_sys: Registered thermal governor 'step_wise' May 13 08:36:50.986080 kernel: thermal_sys: Registered thermal governor 'user_space' May 13 08:36:50.986088 kernel: cpuidle: using governor menu May 13 08:36:50.986096 kernel: ACPI: bus type PCI registered May 13 08:36:50.986106 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 13 08:36:50.986123 kernel: dca service started, version 1.12.1 May 13 08:36:50.986131 kernel: PCI: Using configuration type 1 for base access May 13 08:36:50.986140 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 13 08:36:50.986148 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 13 08:36:50.986156 kernel: ACPI: Added _OSI(Module Device) May 13 08:36:50.986164 kernel: ACPI: Added _OSI(Processor Device) May 13 08:36:50.986172 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 13 08:36:50.986180 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 13 08:36:50.986189 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 13 08:36:50.986197 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 13 08:36:50.986206 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 13 08:36:50.986214 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 13 08:36:50.986222 kernel: ACPI: Interpreter enabled May 13 08:36:50.986230 kernel: ACPI: PM: (supports S0 S3 S5) May 13 08:36:50.986238 kernel: ACPI: Using IOAPIC for interrupt routing May 13 08:36:50.986246 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 13 08:36:50.986254 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 13 08:36:50.986263 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 13 08:36:50.986400 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 13 08:36:50.986485 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 13 08:36:50.986498 kernel: acpiphp: Slot [3] registered May 13 08:36:50.986506 kernel: acpiphp: Slot [4] registered May 13 08:36:50.986514 kernel: acpiphp: Slot [5] registered May 13 08:36:50.986522 kernel: acpiphp: Slot [6] registered May 13 08:36:50.986529 kernel: acpiphp: Slot [7] registered May 13 08:36:50.986540 kernel: acpiphp: Slot [8] registered May 13 08:36:50.986548 kernel: acpiphp: Slot [9] registered May 13 08:36:50.986556 kernel: acpiphp: Slot [10] registered May 13 08:36:50.986564 kernel: acpiphp: Slot [11] registered May 13 08:36:50.986572 kernel: acpiphp: Slot [12] registered May 13 08:36:50.986579 kernel: acpiphp: Slot [13] registered May 13 08:36:50.986587 kernel: acpiphp: Slot [14] registered May 13 08:36:50.986595 kernel: acpiphp: Slot [15] registered May 13 08:36:50.986603 kernel: acpiphp: Slot [16] registered May 13 08:36:50.986612 kernel: acpiphp: Slot [17] registered May 13 08:36:50.986620 kernel: acpiphp: Slot [18] registered May 13 08:36:50.986628 kernel: acpiphp: Slot [19] registered May 13 08:36:50.986636 kernel: acpiphp: Slot [20] registered May 13 08:36:50.986644 kernel: acpiphp: Slot [21] registered May 13 08:36:50.986652 kernel: acpiphp: Slot [22] registered May 13 08:36:50.986660 kernel: acpiphp: Slot [23] registered May 13 08:36:50.986667 kernel: acpiphp: Slot [24] registered May 13 08:36:50.986675 kernel: acpiphp: Slot [25] registered May 13 08:36:50.986683 kernel: acpiphp: Slot [26] registered May 13 08:36:50.986692 kernel: acpiphp: Slot [27] registered May 13 08:36:50.986700 kernel: acpiphp: Slot [28] registered May 13 08:36:50.986707 kernel: acpiphp: Slot [29] registered May 13 08:36:50.986715 kernel: acpiphp: Slot [30] registered May 13 08:36:50.986723 kernel: acpiphp: Slot [31] registered May 13 08:36:50.986731 kernel: PCI host bridge to bus 0000:00 May 13 08:36:50.986841 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 13 08:36:50.986926 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 13 08:36:50.987002 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 13 08:36:50.987074 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 13 08:36:50.987147 kernel: pci_bus 0000:00: root bus resource [mem 0xc000000000-0xc07fffffff window] May 13 08:36:50.987217 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 13 08:36:50.987312 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 13 08:36:50.987406 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 13 08:36:50.987503 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 May 13 08:36:50.987587 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] May 13 08:36:50.987673 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 13 08:36:50.987757 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 13 08:36:50.987858 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 13 08:36:50.987941 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 13 08:36:50.988032 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 May 13 08:36:50.988118 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI May 13 08:36:50.988199 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB May 13 08:36:50.988289 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 May 13 08:36:50.988372 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] May 13 08:36:50.988458 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xc000000000-0xc000003fff 64bit pref] May 13 08:36:50.988541 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] May 13 08:36:50.988624 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] May 13 08:36:50.988710 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 13 08:36:50.988818 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 May 13 08:36:50.988904 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] May 13 08:36:50.988987 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] May 13 08:36:50.989067 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xc000004000-0xc000007fff 64bit pref] May 13 08:36:50.989148 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] May 13 08:36:50.989243 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 May 13 08:36:50.989330 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] May 13 08:36:50.989413 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] May 13 08:36:50.989494 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xc000008000-0xc00000bfff 64bit pref] May 13 08:36:50.989584 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 May 13 08:36:50.989668 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] May 13 08:36:50.989748 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xc00000c000-0xc00000ffff 64bit pref] May 13 08:36:50.996967 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 May 13 08:36:50.997069 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] May 13 08:36:50.997153 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfeb93000-0xfeb93fff] May 13 08:36:50.997237 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xc000010000-0xc000013fff 64bit pref] May 13 08:36:50.997250 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 13 08:36:50.997259 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 13 08:36:50.997268 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 13 08:36:50.997276 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 13 08:36:50.997288 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 13 08:36:50.997297 kernel: iommu: Default domain type: Translated May 13 08:36:50.997305 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 13 08:36:50.997388 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device May 13 08:36:50.997470 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 13 08:36:50.997551 kernel: pci 0000:00:02.0: vgaarb: bridge control possible May 13 08:36:50.997563 kernel: vgaarb: loaded May 13 08:36:50.997571 kernel: pps_core: LinuxPPS API ver. 1 registered May 13 08:36:50.997580 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 13 08:36:50.997591 kernel: PTP clock support registered May 13 08:36:50.997599 kernel: PCI: Using ACPI for IRQ routing May 13 08:36:50.997607 kernel: PCI: pci_cache_line_size set to 64 bytes May 13 08:36:50.997615 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 13 08:36:50.997623 kernel: e820: reserve RAM buffer [mem 0xbffdd000-0xbfffffff] May 13 08:36:50.997631 kernel: clocksource: Switched to clocksource kvm-clock May 13 08:36:50.997639 kernel: VFS: Disk quotas dquot_6.6.0 May 13 08:36:50.997647 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 13 08:36:50.997655 kernel: pnp: PnP ACPI init May 13 08:36:50.997739 kernel: pnp 00:03: [dma 2] May 13 08:36:50.997752 kernel: pnp: PnP ACPI: found 5 devices May 13 08:36:50.997761 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 13 08:36:50.997769 kernel: NET: Registered PF_INET protocol family May 13 08:36:50.997777 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 13 08:36:50.997805 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 13 08:36:50.997814 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 13 08:36:50.997822 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 13 08:36:50.997833 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 13 08:36:50.997842 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 13 08:36:50.997850 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 08:36:50.997858 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 08:36:50.997866 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 13 08:36:50.997874 kernel: NET: Registered PF_XDP protocol family May 13 08:36:50.997951 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 13 08:36:50.998023 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 13 08:36:50.998093 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 13 08:36:50.998183 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] May 13 08:36:50.998254 kernel: pci_bus 0000:00: resource 8 [mem 0xc000000000-0xc07fffffff window] May 13 08:36:50.998335 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release May 13 08:36:50.998417 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 13 08:36:50.998497 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 13 08:36:50.998510 kernel: PCI: CLS 0 bytes, default 64 May 13 08:36:50.998518 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 13 08:36:50.998527 kernel: software IO TLB: mapped [mem 0x00000000bbfdd000-0x00000000bffdd000] (64MB) May 13 08:36:50.998538 kernel: Initialise system trusted keyrings May 13 08:36:50.998546 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 13 08:36:50.998554 kernel: Key type asymmetric registered May 13 08:36:50.998562 kernel: Asymmetric key parser 'x509' registered May 13 08:36:50.998570 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 13 08:36:50.998578 kernel: io scheduler mq-deadline registered May 13 08:36:50.998586 kernel: io scheduler kyber registered May 13 08:36:50.998594 kernel: io scheduler bfq registered May 13 08:36:50.998602 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 13 08:36:50.998612 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 May 13 08:36:50.998621 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 May 13 08:36:50.998629 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 13 08:36:50.998637 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 May 13 08:36:50.998645 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 13 08:36:50.998653 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 13 08:36:50.998661 kernel: random: crng init done May 13 08:36:50.998669 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 13 08:36:50.998677 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 13 08:36:50.998686 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 13 08:36:50.998695 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 13 08:36:50.998775 kernel: rtc_cmos 00:04: RTC can wake from S4 May 13 08:36:50.998871 kernel: rtc_cmos 00:04: registered as rtc0 May 13 08:36:50.998946 kernel: rtc_cmos 00:04: setting system clock to 2025-05-13T08:36:50 UTC (1747125410) May 13 08:36:50.999019 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram May 13 08:36:50.999031 kernel: NET: Registered PF_INET6 protocol family May 13 08:36:50.999039 kernel: Segment Routing with IPv6 May 13 08:36:50.999050 kernel: In-situ OAM (IOAM) with IPv6 May 13 08:36:50.999058 kernel: NET: Registered PF_PACKET protocol family May 13 08:36:50.999066 kernel: Key type dns_resolver registered May 13 08:36:50.999074 kernel: IPI shorthand broadcast: enabled May 13 08:36:50.999082 kernel: sched_clock: Marking stable (758405088, 162493544)->(990098439, -69199807) May 13 08:36:50.999090 kernel: registered taskstats version 1 May 13 08:36:50.999098 kernel: Loading compiled-in X.509 certificates May 13 08:36:50.999106 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 52373c12592f53b0567bb941a0a0fec888191095' May 13 08:36:50.999114 kernel: Key type .fscrypt registered May 13 08:36:50.999124 kernel: Key type fscrypt-provisioning registered May 13 08:36:50.999132 kernel: ima: No TPM chip found, activating TPM-bypass! May 13 08:36:50.999140 kernel: ima: Allocated hash algorithm: sha1 May 13 08:36:50.999148 kernel: ima: No architecture policies found May 13 08:36:50.999156 kernel: clk: Disabling unused clocks May 13 08:36:50.999164 kernel: Freeing unused kernel image (initmem) memory: 47456K May 13 08:36:50.999172 kernel: Write protecting the kernel read-only data: 28672k May 13 08:36:50.999180 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 13 08:36:50.999190 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 13 08:36:50.999198 kernel: Run /init as init process May 13 08:36:50.999206 kernel: with arguments: May 13 08:36:50.999214 kernel: /init May 13 08:36:50.999221 kernel: with environment: May 13 08:36:50.999229 kernel: HOME=/ May 13 08:36:50.999237 kernel: TERM=linux May 13 08:36:50.999245 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 13 08:36:50.999256 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 08:36:50.999268 systemd[1]: Detected virtualization kvm. May 13 08:36:50.999277 systemd[1]: Detected architecture x86-64. May 13 08:36:50.999286 systemd[1]: Running in initrd. May 13 08:36:50.999294 systemd[1]: No hostname configured, using default hostname. May 13 08:36:50.999303 systemd[1]: Hostname set to . May 13 08:36:50.999312 systemd[1]: Initializing machine ID from VM UUID. May 13 08:36:50.999320 systemd[1]: Queued start job for default target initrd.target. May 13 08:36:50.999331 systemd[1]: Started systemd-ask-password-console.path. May 13 08:36:50.999339 systemd[1]: Reached target cryptsetup.target. May 13 08:36:50.999347 systemd[1]: Reached target paths.target. May 13 08:36:50.999356 systemd[1]: Reached target slices.target. May 13 08:36:50.999364 systemd[1]: Reached target swap.target. May 13 08:36:50.999373 systemd[1]: Reached target timers.target. May 13 08:36:50.999382 systemd[1]: Listening on iscsid.socket. May 13 08:36:50.999390 systemd[1]: Listening on iscsiuio.socket. May 13 08:36:50.999401 systemd[1]: Listening on systemd-journald-audit.socket. May 13 08:36:50.999417 systemd[1]: Listening on systemd-journald-dev-log.socket. May 13 08:36:50.999427 systemd[1]: Listening on systemd-journald.socket. May 13 08:36:50.999435 systemd[1]: Listening on systemd-networkd.socket. May 13 08:36:50.999444 systemd[1]: Listening on systemd-udevd-control.socket. May 13 08:36:50.999453 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 08:36:50.999464 systemd[1]: Reached target sockets.target. May 13 08:36:50.999473 systemd[1]: Starting kmod-static-nodes.service... May 13 08:36:50.999482 systemd[1]: Finished network-cleanup.service. May 13 08:36:50.999491 systemd[1]: Starting systemd-fsck-usr.service... May 13 08:36:50.999500 systemd[1]: Starting systemd-journald.service... May 13 08:36:50.999508 systemd[1]: Starting systemd-modules-load.service... May 13 08:36:50.999517 systemd[1]: Starting systemd-resolved.service... May 13 08:36:50.999526 systemd[1]: Starting systemd-vconsole-setup.service... May 13 08:36:50.999535 systemd[1]: Finished kmod-static-nodes.service. May 13 08:36:50.999546 systemd[1]: Finished systemd-fsck-usr.service. May 13 08:36:50.999555 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 13 08:36:50.999568 systemd-journald[186]: Journal started May 13 08:36:50.999611 systemd-journald[186]: Runtime Journal (/run/log/journal/530e8d60bb024ea4abfee15ebf79d1da) is 8.0M, max 78.4M, 70.4M free. May 13 08:36:50.982319 systemd-modules-load[187]: Inserted module 'overlay' May 13 08:36:51.016007 systemd[1]: Started systemd-resolved.service. May 13 08:36:50.992931 systemd-resolved[188]: Positive Trust Anchors: May 13 08:36:51.030336 systemd[1]: Started systemd-journald.service. May 13 08:36:51.030359 kernel: audit: type=1130 audit(1747125411.015:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:51.030374 kernel: audit: type=1130 audit(1747125411.022:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:51.030386 kernel: audit: type=1130 audit(1747125411.023:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:51.030397 kernel: audit: type=1130 audit(1747125411.023:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:51.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:51.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:51.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:51.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:50.992940 systemd-resolved[188]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 08:36:51.051357 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 13 08:36:51.051405 kernel: Bridge firewalling registered May 13 08:36:50.992976 systemd-resolved[188]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 08:36:50.995553 systemd-resolved[188]: Defaulting to hostname 'linux'. May 13 08:36:51.023603 systemd[1]: Finished systemd-vconsole-setup.service. May 13 08:36:51.024173 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 13 08:36:51.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:51.024686 systemd[1]: Reached target nss-lookup.target. May 13 08:36:51.069177 kernel: audit: type=1130 audit(1747125411.061:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:51.030079 systemd[1]: Starting dracut-cmdline-ask.service... May 13 08:36:51.046772 systemd-modules-load[187]: Inserted module 'br_netfilter' May 13 08:36:51.062023 systemd[1]: Finished dracut-cmdline-ask.service. May 13 08:36:51.063248 systemd[1]: Starting dracut-cmdline.service... May 13 08:36:51.079807 kernel: SCSI subsystem initialized May 13 08:36:51.079836 dracut-cmdline[202]: dracut-dracut-053 May 13 08:36:51.079836 dracut-cmdline[202]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 08:36:51.093594 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 13 08:36:51.093619 kernel: device-mapper: uevent: version 1.0.3 May 13 08:36:51.095653 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 13 08:36:51.098763 systemd-modules-load[187]: Inserted module 'dm_multipath' May 13 08:36:51.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:51.100076 systemd[1]: Finished systemd-modules-load.service. May 13 08:36:51.101289 systemd[1]: Starting systemd-sysctl.service... May 13 08:36:51.107215 kernel: audit: type=1130 audit(1747125411.099:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:51.112629 systemd[1]: Finished systemd-sysctl.service. May 13 08:36:51.118552 kernel: audit: type=1130 audit(1747125411.112:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:51.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:51.140813 kernel: Loading iSCSI transport class v2.0-870. May 13 08:36:51.160819 kernel: iscsi: registered transport (tcp) May 13 08:36:51.186614 kernel: iscsi: registered transport (qla4xxx) May 13 08:36:51.186647 kernel: QLogic iSCSI HBA Driver May 13 08:36:51.233278 systemd[1]: Finished dracut-cmdline.service. May 13 08:36:51.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:51.236937 systemd[1]: Starting dracut-pre-udev.service... May 13 08:36:51.248065 kernel: audit: type=1130 audit(1747125411.233:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:51.314892 kernel: raid6: sse2x4 gen() 7066 MB/s May 13 08:36:51.332887 kernel: raid6: sse2x4 xor() 7356 MB/s May 13 08:36:51.350886 kernel: raid6: sse2x2 gen() 14797 MB/s May 13 08:36:51.368887 kernel: raid6: sse2x2 xor() 8834 MB/s May 13 08:36:51.386894 kernel: raid6: sse2x1 gen() 11443 MB/s May 13 08:36:51.405168 kernel: raid6: sse2x1 xor() 7018 MB/s May 13 08:36:51.405226 kernel: raid6: using algorithm sse2x2 gen() 14797 MB/s May 13 08:36:51.405254 kernel: raid6: .... xor() 8834 MB/s, rmw enabled May 13 08:36:51.406347 kernel: raid6: using ssse3x2 recovery algorithm May 13 08:36:51.420886 kernel: xor: measuring software checksum speed May 13 08:36:51.420945 kernel: prefetch64-sse : 17117 MB/sec May 13 08:36:51.426905 kernel: generic_sse : 15978 MB/sec May 13 08:36:51.426962 kernel: xor: using function: prefetch64-sse (17117 MB/sec) May 13 08:36:51.540867 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 13 08:36:51.555154 systemd[1]: Finished dracut-pre-udev.service. May 13 08:36:51.569187 kernel: audit: type=1130 audit(1747125411.554:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:51.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:51.555000 audit: BPF prog-id=7 op=LOAD May 13 08:36:51.555000 audit: BPF prog-id=8 op=LOAD May 13 08:36:51.556531 systemd[1]: Starting systemd-udevd.service... May 13 08:36:51.579623 systemd-udevd[385]: Using default interface naming scheme 'v252'. May 13 08:36:51.584181 systemd[1]: Started systemd-udevd.service. May 13 08:36:51.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:51.596654 systemd[1]: Starting dracut-pre-trigger.service... May 13 08:36:51.620688 dracut-pre-trigger[406]: rd.md=0: removing MD RAID activation May 13 08:36:51.660096 systemd[1]: Finished dracut-pre-trigger.service. May 13 08:36:51.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:51.661324 systemd[1]: Starting systemd-udev-trigger.service... May 13 08:36:51.703108 systemd[1]: Finished systemd-udev-trigger.service. May 13 08:36:51.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:51.764229 kernel: virtio_blk virtio2: [vda] 20971520 512-byte logical blocks (10.7 GB/10.0 GiB) May 13 08:36:51.792831 kernel: libata version 3.00 loaded. May 13 08:36:51.792847 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 13 08:36:51.792863 kernel: GPT:17805311 != 20971519 May 13 08:36:51.792873 kernel: GPT:Alternate GPT header not at the end of the disk. May 13 08:36:51.792883 kernel: GPT:17805311 != 20971519 May 13 08:36:51.792892 kernel: GPT: Use GNU Parted to correct GPT errors. May 13 08:36:51.792902 kernel: ata_piix 0000:00:01.1: version 2.13 May 13 08:36:51.799405 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 08:36:51.799433 kernel: scsi host0: ata_piix May 13 08:36:51.799636 kernel: scsi host1: ata_piix May 13 08:36:51.799842 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 May 13 08:36:51.799858 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 May 13 08:36:51.821445 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (455) May 13 08:36:51.829061 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 13 08:36:51.879544 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 13 08:36:51.883429 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 13 08:36:51.884599 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 13 08:36:51.889376 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 08:36:51.891192 systemd[1]: Starting disk-uuid.service... May 13 08:36:51.902997 disk-uuid[471]: Primary Header is updated. May 13 08:36:51.902997 disk-uuid[471]: Secondary Entries is updated. May 13 08:36:51.902997 disk-uuid[471]: Secondary Header is updated. May 13 08:36:51.916814 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 08:36:51.923221 kernel: GPT:disk_guids don't match. May 13 08:36:51.923253 kernel: GPT: Use GNU Parted to correct GPT errors. May 13 08:36:51.923265 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 08:36:52.934849 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 08:36:52.935431 disk-uuid[473]: The operation has completed successfully. May 13 08:36:53.001896 systemd[1]: disk-uuid.service: Deactivated successfully. May 13 08:36:53.003163 systemd[1]: Finished disk-uuid.service. May 13 08:36:53.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:53.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:53.031101 systemd[1]: Starting verity-setup.service... May 13 08:36:53.066878 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" May 13 08:36:53.170850 systemd[1]: Found device dev-mapper-usr.device. May 13 08:36:53.174890 systemd[1]: Mounting sysusr-usr.mount... May 13 08:36:53.181720 systemd[1]: Finished verity-setup.service. May 13 08:36:53.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:53.309882 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 13 08:36:53.310667 systemd[1]: Mounted sysusr-usr.mount. May 13 08:36:53.311278 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 13 08:36:53.311976 systemd[1]: Starting ignition-setup.service... May 13 08:36:53.315385 systemd[1]: Starting parse-ip-for-networkd.service... May 13 08:36:53.343981 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 08:36:53.344013 kernel: BTRFS info (device vda6): using free space tree May 13 08:36:53.344029 kernel: BTRFS info (device vda6): has skinny extents May 13 08:36:53.365502 systemd[1]: mnt-oem.mount: Deactivated successfully. May 13 08:36:53.379743 systemd[1]: Finished ignition-setup.service. May 13 08:36:53.381016 systemd[1]: Starting ignition-fetch-offline.service... May 13 08:36:53.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:53.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:53.424000 audit: BPF prog-id=9 op=LOAD May 13 08:36:53.424411 systemd[1]: Finished parse-ip-for-networkd.service. May 13 08:36:53.426131 systemd[1]: Starting systemd-networkd.service... May 13 08:36:53.450440 systemd-networkd[643]: lo: Link UP May 13 08:36:53.450451 systemd-networkd[643]: lo: Gained carrier May 13 08:36:53.451190 systemd-networkd[643]: Enumeration completed May 13 08:36:53.451565 systemd-networkd[643]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 08:36:53.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:53.452503 systemd[1]: Started systemd-networkd.service. May 13 08:36:53.453139 systemd-networkd[643]: eth0: Link UP May 13 08:36:53.453143 systemd-networkd[643]: eth0: Gained carrier May 13 08:36:53.453373 systemd[1]: Reached target network.target. May 13 08:36:53.455778 systemd[1]: Starting iscsiuio.service... May 13 08:36:53.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:53.463402 systemd[1]: Started iscsiuio.service. May 13 08:36:53.464669 systemd[1]: Starting iscsid.service... May 13 08:36:53.466467 systemd-networkd[643]: eth0: DHCPv4 address 172.24.4.14/24, gateway 172.24.4.1 acquired from 172.24.4.1 May 13 08:36:53.468549 iscsid[648]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 13 08:36:53.468549 iscsid[648]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 13 08:36:53.468549 iscsid[648]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 13 08:36:53.468549 iscsid[648]: If using hardware iscsi like qla4xxx this message can be ignored. May 13 08:36:53.468549 iscsid[648]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 13 08:36:53.468549 iscsid[648]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 13 08:36:53.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:53.469166 systemd[1]: Started iscsid.service. May 13 08:36:53.470671 systemd[1]: Starting dracut-initqueue.service... May 13 08:36:53.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:53.483482 systemd[1]: Finished dracut-initqueue.service. May 13 08:36:53.484045 systemd[1]: Reached target remote-fs-pre.target. May 13 08:36:53.484489 systemd[1]: Reached target remote-cryptsetup.target. May 13 08:36:53.484950 systemd[1]: Reached target remote-fs.target. May 13 08:36:53.485991 systemd[1]: Starting dracut-pre-mount.service... May 13 08:36:53.495941 systemd[1]: Finished dracut-pre-mount.service. May 13 08:36:53.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:53.683954 ignition[587]: Ignition 2.14.0 May 13 08:36:53.684885 ignition[587]: Stage: fetch-offline May 13 08:36:53.685016 ignition[587]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 08:36:53.685060 ignition[587]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 08:36:53.687244 ignition[587]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 08:36:53.687467 ignition[587]: parsed url from cmdline: "" May 13 08:36:53.687477 ignition[587]: no config URL provided May 13 08:36:53.687490 ignition[587]: reading system config file "/usr/lib/ignition/user.ign" May 13 08:36:53.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:53.690001 systemd[1]: Finished ignition-fetch-offline.service. May 13 08:36:53.687510 ignition[587]: no config at "/usr/lib/ignition/user.ign" May 13 08:36:53.693906 systemd[1]: Starting ignition-fetch.service... May 13 08:36:53.687524 ignition[587]: failed to fetch config: resource requires networking May 13 08:36:53.688346 ignition[587]: Ignition finished successfully May 13 08:36:53.711369 ignition[667]: Ignition 2.14.0 May 13 08:36:53.711391 ignition[667]: Stage: fetch May 13 08:36:53.711583 ignition[667]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 08:36:53.711621 ignition[667]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 08:36:53.713394 ignition[667]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 08:36:53.713571 ignition[667]: parsed url from cmdline: "" May 13 08:36:53.713579 ignition[667]: no config URL provided May 13 08:36:53.713590 ignition[667]: reading system config file "/usr/lib/ignition/user.ign" May 13 08:36:53.713608 ignition[667]: no config at "/usr/lib/ignition/user.ign" May 13 08:36:53.719684 ignition[667]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... May 13 08:36:53.719711 ignition[667]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... May 13 08:36:53.719775 ignition[667]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 May 13 08:36:54.054830 ignition[667]: GET result: OK May 13 08:36:54.054967 ignition[667]: parsing config with SHA512: 60df1d89b54aca1f89ff42b9cae79393edc98263fd5a9d751418ce02684ad83ca0cb6c41faf5bb4d8fb1c6a826805806e553af262ecf9d54fc5fc91da4567174 May 13 08:36:54.069777 unknown[667]: fetched base config from "system" May 13 08:36:54.069850 unknown[667]: fetched base config from "system" May 13 08:36:54.070837 ignition[667]: fetch: fetch complete May 13 08:36:54.069864 unknown[667]: fetched user config from "openstack" May 13 08:36:54.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:54.070849 ignition[667]: fetch: fetch passed May 13 08:36:54.073224 systemd[1]: Finished ignition-fetch.service. May 13 08:36:54.070915 ignition[667]: Ignition finished successfully May 13 08:36:54.076331 systemd[1]: Starting ignition-kargs.service... May 13 08:36:54.103709 ignition[673]: Ignition 2.14.0 May 13 08:36:54.103735 ignition[673]: Stage: kargs May 13 08:36:54.104043 ignition[673]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 08:36:54.104088 ignition[673]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 08:36:54.106314 ignition[673]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 08:36:54.108953 ignition[673]: kargs: kargs passed May 13 08:36:54.110552 systemd[1]: Finished ignition-kargs.service. May 13 08:36:54.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:54.109044 ignition[673]: Ignition finished successfully May 13 08:36:54.114055 systemd[1]: Starting ignition-disks.service... May 13 08:36:54.130937 ignition[679]: Ignition 2.14.0 May 13 08:36:54.130962 ignition[679]: Stage: disks May 13 08:36:54.131207 ignition[679]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 08:36:54.131251 ignition[679]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 08:36:54.133232 ignition[679]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 08:36:54.135628 ignition[679]: disks: disks passed May 13 08:36:54.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:54.137090 systemd[1]: Finished ignition-disks.service. May 13 08:36:54.135715 ignition[679]: Ignition finished successfully May 13 08:36:54.138906 systemd[1]: Reached target initrd-root-device.target. May 13 08:36:54.140993 systemd[1]: Reached target local-fs-pre.target. May 13 08:36:54.143252 systemd[1]: Reached target local-fs.target. May 13 08:36:54.145442 systemd[1]: Reached target sysinit.target. May 13 08:36:54.147702 systemd[1]: Reached target basic.target. May 13 08:36:54.151318 systemd[1]: Starting systemd-fsck-root.service... May 13 08:36:54.180003 systemd-fsck[687]: ROOT: clean, 619/1628000 files, 124060/1617920 blocks May 13 08:36:54.195158 systemd[1]: Finished systemd-fsck-root.service. May 13 08:36:54.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:54.197732 systemd[1]: Mounting sysroot.mount... May 13 08:36:54.217860 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 13 08:36:54.218604 systemd[1]: Mounted sysroot.mount. May 13 08:36:54.219848 systemd[1]: Reached target initrd-root-fs.target. May 13 08:36:54.224090 systemd[1]: Mounting sysroot-usr.mount... May 13 08:36:54.225853 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 13 08:36:54.227155 systemd[1]: Starting flatcar-openstack-hostname.service... May 13 08:36:54.232037 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 13 08:36:54.232092 systemd[1]: Reached target ignition-diskful.target. May 13 08:36:54.237104 systemd[1]: Mounted sysroot-usr.mount. May 13 08:36:54.245408 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 13 08:36:54.248086 systemd[1]: Starting initrd-setup-root.service... May 13 08:36:54.261306 initrd-setup-root[699]: cut: /sysroot/etc/passwd: No such file or directory May 13 08:36:54.276848 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (694) May 13 08:36:54.281689 initrd-setup-root[707]: cut: /sysroot/etc/group: No such file or directory May 13 08:36:54.289754 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 08:36:54.289798 kernel: BTRFS info (device vda6): using free space tree May 13 08:36:54.289815 kernel: BTRFS info (device vda6): has skinny extents May 13 08:36:54.294614 initrd-setup-root[731]: cut: /sysroot/etc/shadow: No such file or directory May 13 08:36:54.299176 initrd-setup-root[739]: cut: /sysroot/etc/gshadow: No such file or directory May 13 08:36:54.305816 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 13 08:36:54.386896 systemd[1]: Finished initrd-setup-root.service. May 13 08:36:54.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:54.389705 systemd[1]: Starting ignition-mount.service... May 13 08:36:54.400019 systemd[1]: Starting sysroot-boot.service... May 13 08:36:54.408099 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 13 08:36:54.408323 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 13 08:36:54.430116 coreos-metadata[693]: May 13 08:36:54.430 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 May 13 08:36:54.433211 ignition[762]: INFO : Ignition 2.14.0 May 13 08:36:54.433211 ignition[762]: INFO : Stage: mount May 13 08:36:54.434325 ignition[762]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 08:36:54.434325 ignition[762]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 08:36:54.436385 ignition[762]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 08:36:54.437428 ignition[762]: INFO : mount: mount passed May 13 08:36:54.438511 ignition[762]: INFO : Ignition finished successfully May 13 08:36:54.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:54.438371 systemd[1]: Finished ignition-mount.service. May 13 08:36:54.443505 systemd[1]: Finished sysroot-boot.service. May 13 08:36:54.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:54.446967 coreos-metadata[693]: May 13 08:36:54.446 INFO Fetch successful May 13 08:36:54.446967 coreos-metadata[693]: May 13 08:36:54.446 INFO wrote hostname ci-3510-3-7-n-702ca96d1c.novalocal to /sysroot/etc/hostname May 13 08:36:54.449853 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. May 13 08:36:54.449932 systemd[1]: Finished flatcar-openstack-hostname.service. May 13 08:36:54.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:54.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:54.452442 systemd[1]: Starting ignition-files.service... May 13 08:36:54.458832 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 13 08:36:54.468824 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (771) May 13 08:36:54.474487 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 08:36:54.474510 kernel: BTRFS info (device vda6): using free space tree May 13 08:36:54.474521 kernel: BTRFS info (device vda6): has skinny extents May 13 08:36:54.481855 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 13 08:36:54.491274 ignition[790]: INFO : Ignition 2.14.0 May 13 08:36:54.492066 ignition[790]: INFO : Stage: files May 13 08:36:54.492666 ignition[790]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 08:36:54.493406 ignition[790]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 08:36:54.495372 ignition[790]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 08:36:54.498284 ignition[790]: DEBUG : files: compiled without relabeling support, skipping May 13 08:36:54.499804 ignition[790]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 13 08:36:54.500538 ignition[790]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 13 08:36:54.504565 ignition[790]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 13 08:36:54.505476 ignition[790]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 13 08:36:54.507607 unknown[790]: wrote ssh authorized keys file for user: core May 13 08:36:54.508282 ignition[790]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 13 08:36:54.509572 ignition[790]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 13 08:36:54.510660 ignition[790]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 13 08:36:54.823502 ignition[790]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 13 08:36:55.420499 systemd-networkd[643]: eth0: Gained IPv6LL May 13 08:36:55.542494 ignition[790]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 13 08:36:55.542494 ignition[790]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 13 08:36:55.547424 ignition[790]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 13 08:36:55.547424 ignition[790]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 13 08:36:55.547424 ignition[790]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 13 08:36:55.547424 ignition[790]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 13 08:36:55.547424 ignition[790]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 13 08:36:55.547424 ignition[790]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 13 08:36:55.547424 ignition[790]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 13 08:36:55.547424 ignition[790]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 13 08:36:55.547424 ignition[790]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 13 08:36:55.547424 ignition[790]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 13 08:36:55.547424 ignition[790]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 13 08:36:55.547424 ignition[790]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 13 08:36:55.547424 ignition[790]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 May 13 08:36:56.333108 ignition[790]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 13 08:36:58.436822 ignition[790]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 13 08:36:58.438669 ignition[790]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" May 13 08:36:58.438669 ignition[790]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" May 13 08:36:58.438669 ignition[790]: INFO : files: op(c): [started] processing unit "prepare-helm.service" May 13 08:36:58.438669 ignition[790]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 13 08:36:58.438669 ignition[790]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 13 08:36:58.438669 ignition[790]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" May 13 08:36:58.438669 ignition[790]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 13 08:36:58.438669 ignition[790]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 13 08:36:58.438669 ignition[790]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 13 08:36:58.449038 ignition[790]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 13 08:36:58.457061 ignition[790]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" May 13 08:36:58.457061 ignition[790]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" May 13 08:36:58.457061 ignition[790]: INFO : files: files passed May 13 08:36:58.457061 ignition[790]: INFO : Ignition finished successfully May 13 08:36:58.489139 kernel: kauditd_printk_skb: 26 callbacks suppressed May 13 08:36:58.489174 kernel: audit: type=1130 audit(1747125418.463:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.459097 systemd[1]: Finished ignition-files.service. May 13 08:36:58.468402 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 13 08:36:58.484282 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 13 08:36:58.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.485514 systemd[1]: Starting ignition-quench.service... May 13 08:36:58.518057 kernel: audit: type=1130 audit(1747125418.493:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.518074 kernel: audit: type=1131 audit(1747125418.493:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.518099 initrd-setup-root-after-ignition[815]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 13 08:36:58.493224 systemd[1]: ignition-quench.service: Deactivated successfully. May 13 08:36:58.493361 systemd[1]: Finished ignition-quench.service. May 13 08:36:58.509102 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 13 08:36:58.525575 kernel: audit: type=1130 audit(1747125418.519:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.520584 systemd[1]: Reached target ignition-complete.target. May 13 08:36:58.526673 systemd[1]: Starting initrd-parse-etc.service... May 13 08:36:58.538618 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 13 08:36:58.539299 systemd[1]: Finished initrd-parse-etc.service. May 13 08:36:58.540351 systemd[1]: Reached target initrd-fs.target. May 13 08:36:58.551681 kernel: audit: type=1130 audit(1747125418.539:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.551701 kernel: audit: type=1131 audit(1747125418.539:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.552174 systemd[1]: Reached target initrd.target. May 13 08:36:58.552685 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 13 08:36:58.553372 systemd[1]: Starting dracut-pre-pivot.service... May 13 08:36:58.564078 systemd[1]: Finished dracut-pre-pivot.service. May 13 08:36:58.570049 kernel: audit: type=1130 audit(1747125418.563:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.565206 systemd[1]: Starting initrd-cleanup.service... May 13 08:36:58.575977 systemd[1]: Stopped target nss-lookup.target. May 13 08:36:58.576534 systemd[1]: Stopped target remote-cryptsetup.target. May 13 08:36:58.577468 systemd[1]: Stopped target timers.target. May 13 08:36:58.578360 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 13 08:36:58.585211 kernel: audit: type=1131 audit(1747125418.578:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.578463 systemd[1]: Stopped dracut-pre-pivot.service. May 13 08:36:58.579366 systemd[1]: Stopped target initrd.target. May 13 08:36:58.585689 systemd[1]: Stopped target basic.target. May 13 08:36:58.586659 systemd[1]: Stopped target ignition-complete.target. May 13 08:36:58.587578 systemd[1]: Stopped target ignition-diskful.target. May 13 08:36:58.588457 systemd[1]: Stopped target initrd-root-device.target. May 13 08:36:58.589377 systemd[1]: Stopped target remote-fs.target. May 13 08:36:58.590255 systemd[1]: Stopped target remote-fs-pre.target. May 13 08:36:58.591181 systemd[1]: Stopped target sysinit.target. May 13 08:36:58.592090 systemd[1]: Stopped target local-fs.target. May 13 08:36:58.592995 systemd[1]: Stopped target local-fs-pre.target. May 13 08:36:58.593857 systemd[1]: Stopped target swap.target. May 13 08:36:58.600725 kernel: audit: type=1131 audit(1747125418.594:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.594640 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 13 08:36:58.594777 systemd[1]: Stopped dracut-pre-mount.service. May 13 08:36:58.607062 kernel: audit: type=1131 audit(1747125418.601:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.595647 systemd[1]: Stopped target cryptsetup.target. May 13 08:36:58.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.601282 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 13 08:36:58.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.601430 systemd[1]: Stopped dracut-initqueue.service. May 13 08:36:58.602388 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 13 08:36:58.602531 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 13 08:36:58.607727 systemd[1]: ignition-files.service: Deactivated successfully. May 13 08:36:58.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.625119 ignition[828]: INFO : Ignition 2.14.0 May 13 08:36:58.625119 ignition[828]: INFO : Stage: umount May 13 08:36:58.625119 ignition[828]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 08:36:58.625119 ignition[828]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 08:36:58.625119 ignition[828]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 08:36:58.625119 ignition[828]: INFO : umount: umount passed May 13 08:36:58.625119 ignition[828]: INFO : Ignition finished successfully May 13 08:36:58.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.607890 systemd[1]: Stopped ignition-files.service. May 13 08:36:58.609346 systemd[1]: Stopping ignition-mount.service... May 13 08:36:58.617340 systemd[1]: Stopping iscsiuio.service... May 13 08:36:58.617747 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 13 08:36:58.617891 systemd[1]: Stopped kmod-static-nodes.service. May 13 08:36:58.620200 systemd[1]: Stopping sysroot-boot.service... May 13 08:36:58.620643 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 13 08:36:58.620764 systemd[1]: Stopped systemd-udev-trigger.service. May 13 08:36:58.621350 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 13 08:36:58.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.621457 systemd[1]: Stopped dracut-pre-trigger.service. May 13 08:36:58.623405 systemd[1]: iscsiuio.service: Deactivated successfully. May 13 08:36:58.623488 systemd[1]: Stopped iscsiuio.service. May 13 08:36:58.624731 systemd[1]: ignition-mount.service: Deactivated successfully. May 13 08:36:58.624814 systemd[1]: Stopped ignition-mount.service. May 13 08:36:58.626342 systemd[1]: ignition-disks.service: Deactivated successfully. May 13 08:36:58.626444 systemd[1]: Stopped ignition-disks.service. May 13 08:36:58.627511 systemd[1]: ignition-kargs.service: Deactivated successfully. May 13 08:36:58.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.627547 systemd[1]: Stopped ignition-kargs.service. May 13 08:36:58.628775 systemd[1]: ignition-fetch.service: Deactivated successfully. May 13 08:36:58.628827 systemd[1]: Stopped ignition-fetch.service. May 13 08:36:58.630405 systemd[1]: Stopped target network.target. May 13 08:36:58.638657 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 13 08:36:58.638698 systemd[1]: Stopped ignition-fetch-offline.service. May 13 08:36:58.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.642383 systemd[1]: Stopped target paths.target. May 13 08:36:58.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.642800 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 13 08:36:58.646917 systemd[1]: Stopped systemd-ask-password-console.path. May 13 08:36:58.647427 systemd[1]: Stopped target slices.target. May 13 08:36:58.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.647849 systemd[1]: Stopped target sockets.target. May 13 08:36:58.648279 systemd[1]: iscsid.socket: Deactivated successfully. May 13 08:36:58.648303 systemd[1]: Closed iscsid.socket. May 13 08:36:58.648712 systemd[1]: iscsiuio.socket: Deactivated successfully. May 13 08:36:58.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.648741 systemd[1]: Closed iscsiuio.socket. May 13 08:36:58.649166 systemd[1]: ignition-setup.service: Deactivated successfully. May 13 08:36:58.649202 systemd[1]: Stopped ignition-setup.service. May 13 08:36:58.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.649927 systemd[1]: Stopping systemd-networkd.service... May 13 08:36:58.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.650992 systemd[1]: Stopping systemd-resolved.service... May 13 08:36:58.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.652746 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 13 08:36:58.653270 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 13 08:36:58.653344 systemd[1]: Finished initrd-cleanup.service. May 13 08:36:58.654101 systemd[1]: sysroot-boot.service: Deactivated successfully. May 13 08:36:58.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.654172 systemd[1]: Stopped sysroot-boot.service. May 13 08:36:58.654825 systemd-networkd[643]: eth0: DHCPv6 lease lost May 13 08:36:58.670000 audit: BPF prog-id=9 op=UNLOAD May 13 08:36:58.655944 systemd[1]: systemd-networkd.service: Deactivated successfully. May 13 08:36:58.671000 audit: BPF prog-id=6 op=UNLOAD May 13 08:36:58.656022 systemd[1]: Stopped systemd-networkd.service. May 13 08:36:58.658334 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 13 08:36:58.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.658364 systemd[1]: Closed systemd-networkd.socket. May 13 08:36:58.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.660191 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 13 08:36:58.660229 systemd[1]: Stopped initrd-setup-root.service. May 13 08:36:58.661644 systemd[1]: Stopping network-cleanup.service... May 13 08:36:58.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.663780 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 13 08:36:58.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.663846 systemd[1]: Stopped parse-ip-for-networkd.service. May 13 08:36:58.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.664822 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 13 08:36:58.664857 systemd[1]: Stopped systemd-sysctl.service. May 13 08:36:58.665944 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 13 08:36:58.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.665980 systemd[1]: Stopped systemd-modules-load.service. May 13 08:36:58.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:58.666865 systemd[1]: Stopping systemd-udevd.service... May 13 08:36:58.668648 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 13 08:36:58.669076 systemd[1]: systemd-resolved.service: Deactivated successfully. May 13 08:36:58.669159 systemd[1]: Stopped systemd-resolved.service. May 13 08:36:58.672956 systemd[1]: systemd-udevd.service: Deactivated successfully. May 13 08:36:58.673080 systemd[1]: Stopped systemd-udevd.service. May 13 08:36:58.674174 systemd[1]: network-cleanup.service: Deactivated successfully. May 13 08:36:58.674251 systemd[1]: Stopped network-cleanup.service. May 13 08:36:58.674938 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 13 08:36:58.674972 systemd[1]: Closed systemd-udevd-control.socket. May 13 08:36:58.675668 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 13 08:36:58.675694 systemd[1]: Closed systemd-udevd-kernel.socket. May 13 08:36:58.676585 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 13 08:36:58.676620 systemd[1]: Stopped dracut-pre-udev.service. May 13 08:36:58.677508 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 13 08:36:58.677545 systemd[1]: Stopped dracut-cmdline.service. May 13 08:36:58.678390 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 13 08:36:58.678425 systemd[1]: Stopped dracut-cmdline-ask.service. May 13 08:36:58.680009 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 13 08:36:58.685507 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 13 08:36:58.685550 systemd[1]: Stopped systemd-vconsole-setup.service. May 13 08:36:58.686716 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 13 08:36:58.686802 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 13 08:36:58.687643 systemd[1]: Reached target initrd-switch-root.target. May 13 08:36:58.689159 systemd[1]: Starting initrd-switch-root.service... May 13 08:36:58.706597 systemd[1]: Switching root. May 13 08:36:58.725816 iscsid[648]: iscsid shutting down. May 13 08:36:58.726348 systemd-journald[186]: Journal stopped May 13 08:37:02.690694 systemd-journald[186]: Received SIGTERM from PID 1 (systemd). May 13 08:37:02.690758 kernel: SELinux: Class mctp_socket not defined in policy. May 13 08:37:02.690779 kernel: SELinux: Class anon_inode not defined in policy. May 13 08:37:02.691840 kernel: SELinux: the above unknown classes and permissions will be allowed May 13 08:37:02.691856 kernel: SELinux: policy capability network_peer_controls=1 May 13 08:37:02.691868 kernel: SELinux: policy capability open_perms=1 May 13 08:37:02.691884 kernel: SELinux: policy capability extended_socket_class=1 May 13 08:37:02.691896 kernel: SELinux: policy capability always_check_network=0 May 13 08:37:02.691908 kernel: SELinux: policy capability cgroup_seclabel=1 May 13 08:37:02.691919 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 13 08:37:02.691930 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 13 08:37:02.691941 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 13 08:37:02.691953 systemd[1]: Successfully loaded SELinux policy in 94.493ms. May 13 08:37:02.691972 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.628ms. May 13 08:37:02.691990 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 08:37:02.692003 systemd[1]: Detected virtualization kvm. May 13 08:37:02.692018 systemd[1]: Detected architecture x86-64. May 13 08:37:02.692030 systemd[1]: Detected first boot. May 13 08:37:02.692044 systemd[1]: Hostname set to . May 13 08:37:02.692057 systemd[1]: Initializing machine ID from VM UUID. May 13 08:37:02.692069 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 13 08:37:02.692080 systemd[1]: Populated /etc with preset unit settings. May 13 08:37:02.692094 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 08:37:02.692107 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 08:37:02.692121 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 08:37:02.692134 systemd[1]: iscsid.service: Deactivated successfully. May 13 08:37:02.692149 systemd[1]: Stopped iscsid.service. May 13 08:37:02.692162 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 13 08:37:02.692174 systemd[1]: Stopped initrd-switch-root.service. May 13 08:37:02.692186 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 13 08:37:02.692201 systemd[1]: Created slice system-addon\x2dconfig.slice. May 13 08:37:02.692213 systemd[1]: Created slice system-addon\x2drun.slice. May 13 08:37:02.692226 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 13 08:37:02.692239 systemd[1]: Created slice system-getty.slice. May 13 08:37:02.692255 systemd[1]: Created slice system-modprobe.slice. May 13 08:37:02.692268 systemd[1]: Created slice system-serial\x2dgetty.slice. May 13 08:37:02.692280 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 13 08:37:02.692293 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 13 08:37:02.692305 systemd[1]: Created slice user.slice. May 13 08:37:02.692317 systemd[1]: Started systemd-ask-password-console.path. May 13 08:37:02.692330 systemd[1]: Started systemd-ask-password-wall.path. May 13 08:37:02.692345 systemd[1]: Set up automount boot.automount. May 13 08:37:02.692358 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 13 08:37:02.692371 systemd[1]: Stopped target initrd-switch-root.target. May 13 08:37:02.692382 systemd[1]: Stopped target initrd-fs.target. May 13 08:37:02.692393 systemd[1]: Stopped target initrd-root-fs.target. May 13 08:37:02.692404 systemd[1]: Reached target integritysetup.target. May 13 08:37:02.692416 systemd[1]: Reached target remote-cryptsetup.target. May 13 08:37:02.692430 systemd[1]: Reached target remote-fs.target. May 13 08:37:02.692443 systemd[1]: Reached target slices.target. May 13 08:37:02.692455 systemd[1]: Reached target swap.target. May 13 08:37:02.692467 systemd[1]: Reached target torcx.target. May 13 08:37:02.692478 systemd[1]: Reached target veritysetup.target. May 13 08:37:02.692490 systemd[1]: Listening on systemd-coredump.socket. May 13 08:37:02.692501 systemd[1]: Listening on systemd-initctl.socket. May 13 08:37:02.692512 systemd[1]: Listening on systemd-networkd.socket. May 13 08:37:02.692523 systemd[1]: Listening on systemd-udevd-control.socket. May 13 08:37:02.692534 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 08:37:02.692545 systemd[1]: Listening on systemd-userdbd.socket. May 13 08:37:02.692559 systemd[1]: Mounting dev-hugepages.mount... May 13 08:37:02.692570 systemd[1]: Mounting dev-mqueue.mount... May 13 08:37:02.692581 systemd[1]: Mounting media.mount... May 13 08:37:02.692593 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 08:37:02.692604 systemd[1]: Mounting sys-kernel-debug.mount... May 13 08:37:02.692616 systemd[1]: Mounting sys-kernel-tracing.mount... May 13 08:37:02.692627 systemd[1]: Mounting tmp.mount... May 13 08:37:02.692638 systemd[1]: Starting flatcar-tmpfiles.service... May 13 08:37:02.692650 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 08:37:02.692663 systemd[1]: Starting kmod-static-nodes.service... May 13 08:37:02.692675 systemd[1]: Starting modprobe@configfs.service... May 13 08:37:02.692686 systemd[1]: Starting modprobe@dm_mod.service... May 13 08:37:02.692697 systemd[1]: Starting modprobe@drm.service... May 13 08:37:02.692710 systemd[1]: Starting modprobe@efi_pstore.service... May 13 08:37:02.692722 systemd[1]: Starting modprobe@fuse.service... May 13 08:37:02.692733 systemd[1]: Starting modprobe@loop.service... May 13 08:37:02.692745 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 13 08:37:02.692759 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 13 08:37:02.692770 systemd[1]: Stopped systemd-fsck-root.service. May 13 08:37:02.692781 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 13 08:37:02.695087 systemd[1]: Stopped systemd-fsck-usr.service. May 13 08:37:02.695103 systemd[1]: Stopped systemd-journald.service. May 13 08:37:02.695115 systemd[1]: Starting systemd-journald.service... May 13 08:37:02.695127 kernel: loop: module loaded May 13 08:37:02.695138 systemd[1]: Starting systemd-modules-load.service... May 13 08:37:02.695149 systemd[1]: Starting systemd-network-generator.service... May 13 08:37:02.695161 systemd[1]: Starting systemd-remount-fs.service... May 13 08:37:02.695176 systemd[1]: Starting systemd-udev-trigger.service... May 13 08:37:02.695188 systemd[1]: verity-setup.service: Deactivated successfully. May 13 08:37:02.695199 systemd[1]: Stopped verity-setup.service. May 13 08:37:02.695210 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 08:37:02.695222 kernel: fuse: init (API version 7.34) May 13 08:37:02.695232 systemd[1]: Mounted dev-hugepages.mount. May 13 08:37:02.695244 systemd[1]: Mounted dev-mqueue.mount. May 13 08:37:02.695255 systemd[1]: Mounted media.mount. May 13 08:37:02.695266 systemd[1]: Mounted sys-kernel-debug.mount. May 13 08:37:02.695280 systemd[1]: Mounted sys-kernel-tracing.mount. May 13 08:37:02.695291 systemd[1]: Mounted tmp.mount. May 13 08:37:02.695305 systemd-journald[935]: Journal started May 13 08:37:02.695346 systemd-journald[935]: Runtime Journal (/run/log/journal/530e8d60bb024ea4abfee15ebf79d1da) is 8.0M, max 78.4M, 70.4M free. May 13 08:36:59.013000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 13 08:36:59.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 08:36:59.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 08:36:59.094000 audit: BPF prog-id=10 op=LOAD May 13 08:36:59.094000 audit: BPF prog-id=10 op=UNLOAD May 13 08:36:59.094000 audit: BPF prog-id=11 op=LOAD May 13 08:36:59.094000 audit: BPF prog-id=11 op=UNLOAD May 13 08:36:59.267000 audit[861]: AVC avc: denied { associate } for pid=861 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 13 08:36:59.267000 audit[861]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d892 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=844 pid=861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:36:59.267000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 08:36:59.271000 audit[861]: AVC avc: denied { associate } for pid=861 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 13 08:36:59.271000 audit[861]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d969 a2=1ed a3=0 items=2 ppid=844 pid=861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:36:59.271000 audit: CWD cwd="/" May 13 08:36:59.271000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:36:59.271000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:36:59.271000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 08:37:02.476000 audit: BPF prog-id=12 op=LOAD May 13 08:37:02.476000 audit: BPF prog-id=3 op=UNLOAD May 13 08:37:02.476000 audit: BPF prog-id=13 op=LOAD May 13 08:37:02.476000 audit: BPF prog-id=14 op=LOAD May 13 08:37:02.477000 audit: BPF prog-id=4 op=UNLOAD May 13 08:37:02.477000 audit: BPF prog-id=5 op=UNLOAD May 13 08:37:02.477000 audit: BPF prog-id=15 op=LOAD May 13 08:37:02.477000 audit: BPF prog-id=12 op=UNLOAD May 13 08:37:02.477000 audit: BPF prog-id=16 op=LOAD May 13 08:37:02.477000 audit: BPF prog-id=17 op=LOAD May 13 08:37:02.477000 audit: BPF prog-id=13 op=UNLOAD May 13 08:37:02.477000 audit: BPF prog-id=14 op=UNLOAD May 13 08:37:02.479000 audit: BPF prog-id=18 op=LOAD May 13 08:37:02.479000 audit: BPF prog-id=15 op=UNLOAD May 13 08:37:02.479000 audit: BPF prog-id=19 op=LOAD May 13 08:37:02.479000 audit: BPF prog-id=20 op=LOAD May 13 08:37:02.479000 audit: BPF prog-id=16 op=UNLOAD May 13 08:37:02.479000 audit: BPF prog-id=17 op=UNLOAD May 13 08:37:02.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.488000 audit: BPF prog-id=18 op=UNLOAD May 13 08:37:02.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.643000 audit: BPF prog-id=21 op=LOAD May 13 08:37:02.643000 audit: BPF prog-id=22 op=LOAD May 13 08:37:02.643000 audit: BPF prog-id=23 op=LOAD May 13 08:37:02.643000 audit: BPF prog-id=19 op=UNLOAD May 13 08:37:02.643000 audit: BPF prog-id=20 op=UNLOAD May 13 08:37:02.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.688000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 13 08:37:02.688000 audit[935]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe1ef3ccb0 a2=4000 a3=7ffe1ef3cd4c items=0 ppid=1 pid=935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:02.688000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 13 08:36:59.262060 /usr/lib/systemd/system-generators/torcx-generator[861]: time="2025-05-13T08:36:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 08:37:02.475776 systemd[1]: Queued start job for default target multi-user.target. May 13 08:37:02.697894 systemd[1]: Started systemd-journald.service. May 13 08:36:59.263232 /usr/lib/systemd/system-generators/torcx-generator[861]: time="2025-05-13T08:36:59Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 08:37:02.475802 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 13 08:36:59.263283 /usr/lib/systemd/system-generators/torcx-generator[861]: time="2025-05-13T08:36:59Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 08:37:02.480813 systemd[1]: systemd-journald.service: Deactivated successfully. May 13 08:36:59.263381 /usr/lib/systemd/system-generators/torcx-generator[861]: time="2025-05-13T08:36:59Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 13 08:37:02.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:36:59.263409 /usr/lib/systemd/system-generators/torcx-generator[861]: time="2025-05-13T08:36:59Z" level=debug msg="skipped missing lower profile" missing profile=oem May 13 08:36:59.263481 /usr/lib/systemd/system-generators/torcx-generator[861]: time="2025-05-13T08:36:59Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 13 08:36:59.263518 /usr/lib/systemd/system-generators/torcx-generator[861]: time="2025-05-13T08:36:59Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 13 08:36:59.263992 /usr/lib/systemd/system-generators/torcx-generator[861]: time="2025-05-13T08:36:59Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 13 08:36:59.264092 /usr/lib/systemd/system-generators/torcx-generator[861]: time="2025-05-13T08:36:59Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 08:36:59.264128 /usr/lib/systemd/system-generators/torcx-generator[861]: time="2025-05-13T08:36:59Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 08:36:59.266555 /usr/lib/systemd/system-generators/torcx-generator[861]: time="2025-05-13T08:36:59Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 13 08:36:59.266600 /usr/lib/systemd/system-generators/torcx-generator[861]: time="2025-05-13T08:36:59Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 13 08:36:59.266625 /usr/lib/systemd/system-generators/torcx-generator[861]: time="2025-05-13T08:36:59Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 13 08:36:59.266643 /usr/lib/systemd/system-generators/torcx-generator[861]: time="2025-05-13T08:36:59Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 13 08:36:59.266665 /usr/lib/systemd/system-generators/torcx-generator[861]: time="2025-05-13T08:36:59Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 13 08:36:59.266680 /usr/lib/systemd/system-generators/torcx-generator[861]: time="2025-05-13T08:36:59Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 13 08:37:02.062175 /usr/lib/systemd/system-generators/torcx-generator[861]: time="2025-05-13T08:37:02Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 08:37:02.062649 /usr/lib/systemd/system-generators/torcx-generator[861]: time="2025-05-13T08:37:02Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 08:37:02.062834 /usr/lib/systemd/system-generators/torcx-generator[861]: time="2025-05-13T08:37:02Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 08:37:02.063052 /usr/lib/systemd/system-generators/torcx-generator[861]: time="2025-05-13T08:37:02Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 08:37:02.063117 /usr/lib/systemd/system-generators/torcx-generator[861]: time="2025-05-13T08:37:02Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 13 08:37:02.063196 /usr/lib/systemd/system-generators/torcx-generator[861]: time="2025-05-13T08:37:02Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 13 08:37:02.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.700932 systemd[1]: Finished kmod-static-nodes.service. May 13 08:37:02.701914 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 13 08:37:02.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.702226 systemd[1]: Finished modprobe@configfs.service. May 13 08:37:02.702916 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 08:37:02.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.703144 systemd[1]: Finished modprobe@dm_mod.service. May 13 08:37:02.703783 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 08:37:02.706452 systemd[1]: Finished modprobe@drm.service. May 13 08:37:02.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.707174 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 08:37:02.707673 systemd[1]: Finished modprobe@efi_pstore.service. May 13 08:37:02.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.708341 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 13 08:37:02.708544 systemd[1]: Finished modprobe@fuse.service. May 13 08:37:02.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.709185 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 08:37:02.709310 systemd[1]: Finished modprobe@loop.service. May 13 08:37:02.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.710033 systemd[1]: Finished systemd-modules-load.service. May 13 08:37:02.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.710738 systemd[1]: Finished systemd-network-generator.service. May 13 08:37:02.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.711583 systemd[1]: Finished systemd-remount-fs.service. May 13 08:37:02.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.712466 systemd[1]: Reached target network-pre.target. May 13 08:37:02.714233 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 13 08:37:02.716442 systemd[1]: Mounting sys-kernel-config.mount... May 13 08:37:02.717076 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 13 08:37:02.721371 systemd[1]: Starting systemd-hwdb-update.service... May 13 08:37:02.722779 systemd[1]: Starting systemd-journal-flush.service... May 13 08:37:02.723317 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 08:37:02.724247 systemd[1]: Starting systemd-random-seed.service... May 13 08:37:02.724740 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 08:37:02.725916 systemd[1]: Starting systemd-sysctl.service... May 13 08:37:02.727950 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 13 08:37:02.732691 systemd-journald[935]: Time spent on flushing to /var/log/journal/530e8d60bb024ea4abfee15ebf79d1da is 29.127ms for 1103 entries. May 13 08:37:02.732691 systemd-journald[935]: System Journal (/var/log/journal/530e8d60bb024ea4abfee15ebf79d1da) is 8.0M, max 584.8M, 576.8M free. May 13 08:37:02.794656 systemd-journald[935]: Received client request to flush runtime journal. May 13 08:37:02.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.731464 systemd[1]: Mounted sys-kernel-config.mount. May 13 08:37:02.752877 systemd[1]: Finished systemd-random-seed.service. May 13 08:37:02.753538 systemd[1]: Reached target first-boot-complete.target. May 13 08:37:02.796031 udevadm[970]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 13 08:37:02.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:02.769402 systemd[1]: Finished flatcar-tmpfiles.service. May 13 08:37:02.771035 systemd[1]: Starting systemd-sysusers.service... May 13 08:37:02.775756 systemd[1]: Finished systemd-udev-trigger.service. May 13 08:37:02.776475 systemd[1]: Finished systemd-sysctl.service. May 13 08:37:02.777952 systemd[1]: Starting systemd-udev-settle.service... May 13 08:37:02.795558 systemd[1]: Finished systemd-journal-flush.service. May 13 08:37:02.803864 systemd[1]: Finished systemd-sysusers.service. May 13 08:37:02.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:03.476265 systemd[1]: Finished systemd-hwdb-update.service. May 13 08:37:03.493653 kernel: kauditd_printk_skb: 106 callbacks suppressed May 13 08:37:03.493832 kernel: audit: type=1130 audit(1747125423.476:144): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:03.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:03.492000 audit: BPF prog-id=24 op=LOAD May 13 08:37:03.492000 audit: BPF prog-id=25 op=LOAD May 13 08:37:03.493000 audit: BPF prog-id=7 op=UNLOAD May 13 08:37:03.493000 audit: BPF prog-id=8 op=UNLOAD May 13 08:37:03.494975 systemd[1]: Starting systemd-udevd.service... May 13 08:37:03.502130 kernel: audit: type=1334 audit(1747125423.492:145): prog-id=24 op=LOAD May 13 08:37:03.502220 kernel: audit: type=1334 audit(1747125423.492:146): prog-id=25 op=LOAD May 13 08:37:03.502264 kernel: audit: type=1334 audit(1747125423.493:147): prog-id=7 op=UNLOAD May 13 08:37:03.502305 kernel: audit: type=1334 audit(1747125423.493:148): prog-id=8 op=UNLOAD May 13 08:37:03.541627 systemd-udevd[972]: Using default interface naming scheme 'v252'. May 13 08:37:03.582449 systemd[1]: Started systemd-udevd.service. May 13 08:37:03.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:03.599828 kernel: audit: type=1130 audit(1747125423.586:149): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:03.605000 audit: BPF prog-id=26 op=LOAD May 13 08:37:03.613471 systemd[1]: Starting systemd-networkd.service... May 13 08:37:03.613900 kernel: audit: type=1334 audit(1747125423.605:150): prog-id=26 op=LOAD May 13 08:37:03.626000 audit: BPF prog-id=27 op=LOAD May 13 08:37:03.643007 kernel: audit: type=1334 audit(1747125423.626:151): prog-id=27 op=LOAD May 13 08:37:03.643533 systemd[1]: Starting systemd-userdbd.service... May 13 08:37:03.645496 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 13 08:37:03.641000 audit: BPF prog-id=28 op=LOAD May 13 08:37:03.641000 audit: BPF prog-id=29 op=LOAD May 13 08:37:03.659675 kernel: audit: type=1334 audit(1747125423.641:152): prog-id=28 op=LOAD May 13 08:37:03.659717 kernel: audit: type=1334 audit(1747125423.641:153): prog-id=29 op=LOAD May 13 08:37:03.693666 systemd[1]: Started systemd-userdbd.service. May 13 08:37:03.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:03.709823 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 13 08:37:03.717844 kernel: ACPI: button: Power Button [PWRF] May 13 08:37:03.754000 audit[989]: AVC avc: denied { confidentiality } for pid=989 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 13 08:37:03.763666 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 08:37:03.783090 systemd-networkd[993]: lo: Link UP May 13 08:37:03.783100 systemd-networkd[993]: lo: Gained carrier May 13 08:37:03.784012 systemd-networkd[993]: Enumeration completed May 13 08:37:03.784096 systemd[1]: Started systemd-networkd.service. May 13 08:37:03.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:03.784893 systemd-networkd[993]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 08:37:03.786613 systemd-networkd[993]: eth0: Link UP May 13 08:37:03.786621 systemd-networkd[993]: eth0: Gained carrier May 13 08:37:03.754000 audit[989]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555e5170e250 a1=338ac a2=7f03a98b2bc5 a3=5 items=110 ppid=972 pid=989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:03.754000 audit: CWD cwd="/" May 13 08:37:03.754000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=1 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=2 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=3 name=(null) inode=14543 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=4 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=5 name=(null) inode=14544 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=6 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=7 name=(null) inode=14545 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=8 name=(null) inode=14545 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=9 name=(null) inode=14546 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=10 name=(null) inode=14545 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=11 name=(null) inode=14547 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=12 name=(null) inode=14545 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=13 name=(null) inode=14548 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=14 name=(null) inode=14545 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=15 name=(null) inode=14549 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=16 name=(null) inode=14545 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=17 name=(null) inode=14550 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=18 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=19 name=(null) inode=14551 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=20 name=(null) inode=14551 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=21 name=(null) inode=14552 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=22 name=(null) inode=14551 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=23 name=(null) inode=14553 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=24 name=(null) inode=14551 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=25 name=(null) inode=14554 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=26 name=(null) inode=14551 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=27 name=(null) inode=14555 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=28 name=(null) inode=14551 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=29 name=(null) inode=14556 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=30 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=31 name=(null) inode=14557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=32 name=(null) inode=14557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=33 name=(null) inode=14558 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=34 name=(null) inode=14557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=35 name=(null) inode=14559 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=36 name=(null) inode=14557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=37 name=(null) inode=14560 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=38 name=(null) inode=14557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=39 name=(null) inode=14561 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=40 name=(null) inode=14557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=41 name=(null) inode=14562 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=42 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=43 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=44 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=45 name=(null) inode=14564 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=46 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=47 name=(null) inode=14565 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=48 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=49 name=(null) inode=14566 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=50 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=51 name=(null) inode=14567 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=52 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=53 name=(null) inode=14568 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=55 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=56 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=57 name=(null) inode=14570 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=58 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=59 name=(null) inode=14571 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=60 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=61 name=(null) inode=14572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=62 name=(null) inode=14572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=63 name=(null) inode=14573 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=64 name=(null) inode=14572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=65 name=(null) inode=14574 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=66 name=(null) inode=14572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=67 name=(null) inode=14575 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=68 name=(null) inode=14572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=69 name=(null) inode=14576 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=70 name=(null) inode=14572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=71 name=(null) inode=14577 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=72 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=73 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=74 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=75 name=(null) inode=14579 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=76 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=77 name=(null) inode=14580 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=78 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=79 name=(null) inode=14581 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=80 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=81 name=(null) inode=14582 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=82 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=83 name=(null) inode=14583 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=84 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=85 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=86 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=87 name=(null) inode=14585 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=88 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=89 name=(null) inode=14586 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=90 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=91 name=(null) inode=14587 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=92 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=93 name=(null) inode=14588 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=94 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=95 name=(null) inode=14589 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=96 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=97 name=(null) inode=14590 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=98 name=(null) inode=14590 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=99 name=(null) inode=14591 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=100 name=(null) inode=14590 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=101 name=(null) inode=14592 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=102 name=(null) inode=14590 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=103 name=(null) inode=14593 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=104 name=(null) inode=14590 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=105 name=(null) inode=14594 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=106 name=(null) inode=14590 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=107 name=(null) inode=14595 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PATH item=109 name=(null) inode=13866 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:37:03.754000 audit: PROCTITLE proctitle="(udev-worker)" May 13 08:37:03.795842 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 May 13 08:37:03.800880 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 13 08:37:03.796899 systemd-networkd[993]: eth0: DHCPv4 address 172.24.4.14/24, gateway 172.24.4.1 acquired from 172.24.4.1 May 13 08:37:03.804821 kernel: mousedev: PS/2 mouse device common for all mice May 13 08:37:03.853115 systemd[1]: Finished systemd-udev-settle.service. May 13 08:37:03.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:03.854681 systemd[1]: Starting lvm2-activation-early.service... May 13 08:37:03.881200 lvm[1006]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 08:37:03.910565 systemd[1]: Finished lvm2-activation-early.service. May 13 08:37:03.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:03.912091 systemd[1]: Reached target cryptsetup.target. May 13 08:37:03.915424 systemd[1]: Starting lvm2-activation.service... May 13 08:37:03.922016 lvm[1007]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 08:37:03.956834 systemd[1]: Finished lvm2-activation.service. May 13 08:37:03.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:03.958230 systemd[1]: Reached target local-fs-pre.target. May 13 08:37:03.959417 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 13 08:37:03.959478 systemd[1]: Reached target local-fs.target. May 13 08:37:03.960633 systemd[1]: Reached target machines.target. May 13 08:37:03.964271 systemd[1]: Starting ldconfig.service... May 13 08:37:03.967403 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 08:37:03.967513 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 08:37:03.969888 systemd[1]: Starting systemd-boot-update.service... May 13 08:37:03.973161 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 13 08:37:03.976779 systemd[1]: Starting systemd-machine-id-commit.service... May 13 08:37:03.983981 systemd[1]: Starting systemd-sysext.service... May 13 08:37:04.011605 systemd[1]: Unmounting usr-share-oem.mount... May 13 08:37:04.016480 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1009 (bootctl) May 13 08:37:04.019524 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 13 08:37:04.037999 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 13 08:37:04.038453 systemd[1]: Unmounted usr-share-oem.mount. May 13 08:37:04.046128 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 13 08:37:04.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.098853 kernel: loop0: detected capacity change from 0 to 205544 May 13 08:37:04.386279 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 13 08:37:04.387717 systemd[1]: Finished systemd-machine-id-commit.service. May 13 08:37:04.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.432143 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 13 08:37:04.463871 kernel: loop1: detected capacity change from 0 to 205544 May 13 08:37:04.513573 (sd-sysext)[1023]: Using extensions 'kubernetes'. May 13 08:37:04.516887 (sd-sysext)[1023]: Merged extensions into '/usr'. May 13 08:37:04.555131 systemd-fsck[1020]: fsck.fat 4.2 (2021-01-31) May 13 08:37:04.555131 systemd-fsck[1020]: /dev/vda1: 790 files, 120692/258078 clusters May 13 08:37:04.568891 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 13 08:37:04.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.575716 systemd[1]: Mounting boot.mount... May 13 08:37:04.576909 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 08:37:04.580381 systemd[1]: Mounting usr-share-oem.mount... May 13 08:37:04.583212 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 08:37:04.588024 systemd[1]: Starting modprobe@dm_mod.service... May 13 08:37:04.590568 systemd[1]: Starting modprobe@efi_pstore.service... May 13 08:37:04.592005 systemd[1]: Starting modprobe@loop.service... May 13 08:37:04.592882 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 08:37:04.593009 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 08:37:04.593139 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 08:37:04.594247 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 08:37:04.594365 systemd[1]: Finished modprobe@dm_mod.service. May 13 08:37:04.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.597977 systemd[1]: Mounted usr-share-oem.mount. May 13 08:37:04.598886 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 08:37:04.598995 systemd[1]: Finished modprobe@efi_pstore.service. May 13 08:37:04.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.600106 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 08:37:04.600214 systemd[1]: Finished modprobe@loop.service. May 13 08:37:04.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.603229 systemd[1]: Finished systemd-sysext.service. May 13 08:37:04.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.605424 systemd[1]: Mounted boot.mount. May 13 08:37:04.608238 systemd[1]: Starting ensure-sysext.service... May 13 08:37:04.613126 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 08:37:04.613185 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 08:37:04.614259 systemd[1]: Starting systemd-tmpfiles-setup.service... May 13 08:37:04.617630 systemd[1]: Reloading. May 13 08:37:04.649403 systemd-tmpfiles[1031]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 13 08:37:04.662260 systemd-tmpfiles[1031]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 13 08:37:04.682513 systemd-tmpfiles[1031]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 13 08:37:04.706599 /usr/lib/systemd/system-generators/torcx-generator[1050]: time="2025-05-13T08:37:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 08:37:04.706631 /usr/lib/systemd/system-generators/torcx-generator[1050]: time="2025-05-13T08:37:04Z" level=info msg="torcx already run" May 13 08:37:04.818851 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 08:37:04.819122 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 08:37:04.846941 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 08:37:04.915000 audit: BPF prog-id=30 op=LOAD May 13 08:37:04.916000 audit: BPF prog-id=26 op=UNLOAD May 13 08:37:04.916000 audit: BPF prog-id=31 op=LOAD May 13 08:37:04.916000 audit: BPF prog-id=32 op=LOAD May 13 08:37:04.916000 audit: BPF prog-id=24 op=UNLOAD May 13 08:37:04.916000 audit: BPF prog-id=25 op=UNLOAD May 13 08:37:04.919000 audit: BPF prog-id=33 op=LOAD May 13 08:37:04.920000 audit: BPF prog-id=27 op=UNLOAD May 13 08:37:04.920000 audit: BPF prog-id=34 op=LOAD May 13 08:37:04.920000 audit: BPF prog-id=35 op=LOAD May 13 08:37:04.920000 audit: BPF prog-id=28 op=UNLOAD May 13 08:37:04.920000 audit: BPF prog-id=29 op=UNLOAD May 13 08:37:04.921000 audit: BPF prog-id=36 op=LOAD May 13 08:37:04.921000 audit: BPF prog-id=21 op=UNLOAD May 13 08:37:04.921000 audit: BPF prog-id=37 op=LOAD May 13 08:37:04.921000 audit: BPF prog-id=38 op=LOAD May 13 08:37:04.922000 audit: BPF prog-id=22 op=UNLOAD May 13 08:37:04.922000 audit: BPF prog-id=23 op=UNLOAD May 13 08:37:04.926642 systemd[1]: Finished systemd-boot-update.service. May 13 08:37:04.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.928618 systemd[1]: Finished systemd-tmpfiles-setup.service. May 13 08:37:04.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.934361 systemd[1]: Starting audit-rules.service... May 13 08:37:04.936513 systemd[1]: Starting clean-ca-certificates.service... May 13 08:37:04.939061 systemd[1]: Starting systemd-journal-catalog-update.service... May 13 08:37:04.940000 audit: BPF prog-id=39 op=LOAD May 13 08:37:04.944000 audit: BPF prog-id=40 op=LOAD May 13 08:37:04.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.944441 systemd[1]: Starting systemd-resolved.service... May 13 08:37:04.957000 audit[1106]: SYSTEM_BOOT pid=1106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 13 08:37:04.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.947551 systemd[1]: Starting systemd-timesyncd.service... May 13 08:37:04.951501 systemd[1]: Starting systemd-update-utmp.service... May 13 08:37:04.952842 systemd[1]: Finished clean-ca-certificates.service. May 13 08:37:04.966760 systemd[1]: Finished systemd-update-utmp.service. May 13 08:37:04.970687 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 08:37:04.972811 systemd[1]: Starting modprobe@dm_mod.service... May 13 08:37:04.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.975362 systemd[1]: Starting modprobe@efi_pstore.service... May 13 08:37:04.976951 systemd[1]: Starting modprobe@loop.service... May 13 08:37:04.977591 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 08:37:04.977727 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 08:37:04.977876 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 08:37:04.979095 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 08:37:04.979215 systemd[1]: Finished modprobe@dm_mod.service. May 13 08:37:04.981186 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 08:37:04.981288 systemd[1]: Finished modprobe@loop.service. May 13 08:37:04.982079 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 08:37:04.984940 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 08:37:04.987178 systemd[1]: Starting modprobe@dm_mod.service... May 13 08:37:04.989109 systemd[1]: Starting modprobe@drm.service... May 13 08:37:04.991902 systemd[1]: Starting modprobe@loop.service... May 13 08:37:04.992489 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 08:37:04.992612 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 08:37:04.993726 systemd[1]: Starting systemd-networkd-wait-online.service... May 13 08:37:04.994715 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 08:37:04.995742 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 08:37:04.995881 systemd[1]: Finished modprobe@efi_pstore.service. May 13 08:37:04.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.998309 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 08:37:05.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:04.998423 systemd[1]: Finished modprobe@dm_mod.service. May 13 08:37:04.999249 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 08:37:04.999355 systemd[1]: Finished modprobe@drm.service. May 13 08:37:05.000358 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 08:37:05.001956 systemd[1]: Finished ensure-sysext.service. May 13 08:37:05.004711 ldconfig[1008]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 13 08:37:05.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:05.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:05.008715 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 08:37:05.008845 systemd[1]: Finished modprobe@loop.service. May 13 08:37:05.009432 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 08:37:05.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:05.011746 systemd[1]: Finished systemd-journal-catalog-update.service. May 13 08:37:05.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:05.019027 systemd[1]: Finished ldconfig.service. May 13 08:37:05.020558 systemd[1]: Starting systemd-update-done.service... May 13 08:37:05.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:05.027617 systemd[1]: Finished systemd-update-done.service. May 13 08:37:05.037255 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 08:37:05.037278 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 08:37:05.051000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 13 08:37:05.051000 audit[1126]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffbe139e20 a2=420 a3=0 items=0 ppid=1098 pid=1126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:05.051000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 13 08:37:05.052037 augenrules[1126]: No rules May 13 08:37:05.052417 systemd[1]: Finished audit-rules.service. May 13 08:37:05.066476 systemd[1]: Started systemd-timesyncd.service. May 13 08:37:05.067062 systemd[1]: Reached target time-set.target. May 13 08:37:05.069118 systemd-resolved[1102]: Positive Trust Anchors: May 13 08:37:05.069131 systemd-resolved[1102]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 08:37:05.069166 systemd-resolved[1102]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 08:37:05.076440 systemd-resolved[1102]: Using system hostname 'ci-3510-3-7-n-702ca96d1c.novalocal'. May 13 08:37:05.077726 systemd[1]: Started systemd-resolved.service. May 13 08:37:05.078236 systemd[1]: Reached target network.target. May 13 08:37:05.078660 systemd[1]: Reached target nss-lookup.target. May 13 08:37:05.079104 systemd[1]: Reached target sysinit.target. May 13 08:37:05.079625 systemd[1]: Started motdgen.path. May 13 08:37:05.080069 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 13 08:37:05.080670 systemd[1]: Started logrotate.timer. May 13 08:37:05.081186 systemd[1]: Started mdadm.timer. May 13 08:37:05.081592 systemd[1]: Started systemd-tmpfiles-clean.timer. May 13 08:37:05.082052 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 13 08:37:05.082124 systemd[1]: Reached target paths.target. May 13 08:37:05.082544 systemd[1]: Reached target timers.target. May 13 08:37:05.083220 systemd[1]: Listening on dbus.socket. May 13 08:37:05.084590 systemd[1]: Starting docker.socket... May 13 08:37:05.088033 systemd[1]: Listening on sshd.socket. May 13 08:37:05.088568 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 08:37:05.088954 systemd[1]: Listening on docker.socket. May 13 08:37:05.089446 systemd[1]: Reached target sockets.target. May 13 08:37:05.089903 systemd[1]: Reached target basic.target. May 13 08:37:05.090381 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 08:37:05.090411 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 08:37:05.091259 systemd[1]: Starting containerd.service... May 13 08:37:05.093308 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 13 08:37:05.094689 systemd[1]: Starting dbus.service... May 13 08:37:05.096828 systemd[1]: Starting enable-oem-cloudinit.service... May 13 08:37:05.099208 systemd[1]: Starting extend-filesystems.service... May 13 08:37:05.102238 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 13 08:37:05.103989 systemd[1]: Starting motdgen.service... May 13 08:37:05.108905 systemd[1]: Starting prepare-helm.service... May 13 08:37:05.110461 systemd[1]: Starting ssh-key-proc-cmdline.service... May 13 08:37:05.111928 systemd[1]: Starting sshd-keygen.service... May 13 08:37:05.117903 jq[1139]: false May 13 08:37:05.119864 systemd[1]: Starting systemd-logind.service... May 13 08:37:05.121049 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 08:37:05.121117 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 13 08:37:05.121526 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 13 08:37:05.122823 systemd[1]: Starting update-engine.service... May 13 08:37:05.124668 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 13 08:37:05.129847 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 13 08:37:05.130037 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 13 08:37:05.131275 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 13 08:37:05.131420 systemd[1]: Finished ssh-key-proc-cmdline.service. May 13 08:37:05.144324 jq[1151]: true May 13 08:37:05.144642 tar[1156]: linux-amd64/helm May 13 08:37:05.153655 extend-filesystems[1140]: Found loop1 May 13 08:37:05.154764 extend-filesystems[1140]: Found vda May 13 08:37:05.155551 extend-filesystems[1140]: Found vda1 May 13 08:37:05.156593 extend-filesystems[1140]: Found vda2 May 13 08:37:05.156593 extend-filesystems[1140]: Found vda3 May 13 08:37:05.156593 extend-filesystems[1140]: Found usr May 13 08:37:05.156593 extend-filesystems[1140]: Found vda4 May 13 08:37:05.156593 extend-filesystems[1140]: Found vda6 May 13 08:37:05.156593 extend-filesystems[1140]: Found vda7 May 13 08:37:05.156593 extend-filesystems[1140]: Found vda9 May 13 08:37:05.156593 extend-filesystems[1140]: Checking size of /dev/vda9 May 13 08:37:05.171638 systemd[1]: motdgen.service: Deactivated successfully. May 13 08:37:05.171814 systemd[1]: Finished motdgen.service. May 13 08:37:05.178300 jq[1164]: true May 13 08:37:05.184958 systemd[1]: Created slice system-sshd.slice. May 13 08:37:05.191013 dbus-daemon[1136]: [system] SELinux support is enabled May 13 08:37:05.191147 systemd[1]: Started dbus.service. May 13 08:37:05.193497 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 13 08:37:05.193523 systemd[1]: Reached target system-config.target. May 13 08:37:05.194011 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 13 08:37:05.194026 systemd[1]: Reached target user-config.target. May 13 08:37:05.205951 extend-filesystems[1140]: Resized partition /dev/vda9 May 13 08:37:05.211738 extend-filesystems[1181]: resize2fs 1.46.5 (30-Dec-2021) May 13 08:37:05.244806 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 2014203 blocks May 13 08:37:05.247802 kernel: EXT4-fs (vda9): resized filesystem to 2014203 May 13 08:37:05.806870 systemd-resolved[1102]: Clock change detected. Flushing caches. May 13 08:37:05.815209 systemd-timesyncd[1103]: Contacted time server 99.28.14.242:123 (0.flatcar.pool.ntp.org). May 13 08:37:05.823444 extend-filesystems[1181]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 13 08:37:05.823444 extend-filesystems[1181]: old_desc_blocks = 1, new_desc_blocks = 1 May 13 08:37:05.823444 extend-filesystems[1181]: The filesystem on /dev/vda9 is now 2014203 (4k) blocks long. May 13 08:37:05.826867 env[1160]: time="2025-05-13T08:37:05.818020441Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 13 08:37:05.815260 systemd-timesyncd[1103]: Initial clock synchronization to Tue 2025-05-13 08:37:05.806600 UTC. May 13 08:37:05.827072 extend-filesystems[1140]: Resized filesystem in /dev/vda9 May 13 08:37:05.823502 systemd[1]: extend-filesystems.service: Deactivated successfully. May 13 08:37:05.823650 systemd[1]: Finished extend-filesystems.service. May 13 08:37:05.846861 systemd-logind[1147]: Watching system buttons on /dev/input/event1 (Power Button) May 13 08:37:05.846886 systemd-logind[1147]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 13 08:37:05.849086 bash[1191]: Updated "/home/core/.ssh/authorized_keys" May 13 08:37:05.849698 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 13 08:37:05.854425 systemd-logind[1147]: New seat seat0. May 13 08:37:05.857870 update_engine[1149]: I0513 08:37:05.856783 1149 main.cc:92] Flatcar Update Engine starting May 13 08:37:05.862866 systemd[1]: Started systemd-logind.service. May 13 08:37:05.863852 systemd[1]: Started update-engine.service. May 13 08:37:05.866006 systemd[1]: Started locksmithd.service. May 13 08:37:05.866887 update_engine[1149]: I0513 08:37:05.866863 1149 update_check_scheduler.cc:74] Next update check in 3m51s May 13 08:37:05.903438 env[1160]: time="2025-05-13T08:37:05.903402415Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 13 08:37:05.903584 env[1160]: time="2025-05-13T08:37:05.903559981Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 13 08:37:05.904687 env[1160]: time="2025-05-13T08:37:05.904653562Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 13 08:37:05.904687 env[1160]: time="2025-05-13T08:37:05.904684129Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 13 08:37:05.904893 env[1160]: time="2025-05-13T08:37:05.904867222Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 08:37:05.904942 env[1160]: time="2025-05-13T08:37:05.904891668Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 13 08:37:05.904942 env[1160]: time="2025-05-13T08:37:05.904907027Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 13 08:37:05.904942 env[1160]: time="2025-05-13T08:37:05.904918869Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 13 08:37:05.905014 env[1160]: time="2025-05-13T08:37:05.904994080Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 13 08:37:05.905239 env[1160]: time="2025-05-13T08:37:05.905216818Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 13 08:37:05.905367 env[1160]: time="2025-05-13T08:37:05.905342103Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 08:37:05.905404 env[1160]: time="2025-05-13T08:37:05.905365146Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 13 08:37:05.905429 env[1160]: time="2025-05-13T08:37:05.905416382Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 13 08:37:05.905466 env[1160]: time="2025-05-13T08:37:05.905431651Z" level=info msg="metadata content store policy set" policy=shared May 13 08:37:05.919867 env[1160]: time="2025-05-13T08:37:05.919839533Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 13 08:37:05.919867 env[1160]: time="2025-05-13T08:37:05.919867726Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 13 08:37:05.919980 env[1160]: time="2025-05-13T08:37:05.919881762Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 13 08:37:05.919980 env[1160]: time="2025-05-13T08:37:05.919935743Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 13 08:37:05.919980 env[1160]: time="2025-05-13T08:37:05.919953807Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 13 08:37:05.919980 env[1160]: time="2025-05-13T08:37:05.919973013Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 13 08:37:05.920069 env[1160]: time="2025-05-13T08:37:05.920006967Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 13 08:37:05.920069 env[1160]: time="2025-05-13T08:37:05.920023498Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 13 08:37:05.920069 env[1160]: time="2025-05-13T08:37:05.920037775Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 13 08:37:05.920069 env[1160]: time="2025-05-13T08:37:05.920051901Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 13 08:37:05.920159 env[1160]: time="2025-05-13T08:37:05.920082068Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 13 08:37:05.920159 env[1160]: time="2025-05-13T08:37:05.920097877Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 13 08:37:05.920230 env[1160]: time="2025-05-13T08:37:05.920201221Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 13 08:37:05.920353 env[1160]: time="2025-05-13T08:37:05.920312971Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 13 08:37:05.920650 env[1160]: time="2025-05-13T08:37:05.920627340Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 13 08:37:05.920698 env[1160]: time="2025-05-13T08:37:05.920676142Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 13 08:37:05.920726 env[1160]: time="2025-05-13T08:37:05.920695789Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 13 08:37:05.920775 env[1160]: time="2025-05-13T08:37:05.920756312Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 13 08:37:05.920807 env[1160]: time="2025-05-13T08:37:05.920776671Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 13 08:37:05.920807 env[1160]: time="2025-05-13T08:37:05.920793602Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 13 08:37:05.920870 env[1160]: time="2025-05-13T08:37:05.920806226Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 13 08:37:05.920870 env[1160]: time="2025-05-13T08:37:05.920837364Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 13 08:37:05.920870 env[1160]: time="2025-05-13T08:37:05.920851611Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 13 08:37:05.920870 env[1160]: time="2025-05-13T08:37:05.920865167Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 13 08:37:05.920960 env[1160]: time="2025-05-13T08:37:05.920877409Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 13 08:37:05.920960 env[1160]: time="2025-05-13T08:37:05.920892728Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 13 08:37:05.921074 env[1160]: time="2025-05-13T08:37:05.921051015Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 13 08:37:05.921111 env[1160]: time="2025-05-13T08:37:05.921094306Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 13 08:37:05.921136 env[1160]: time="2025-05-13T08:37:05.921109465Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 13 08:37:05.921136 env[1160]: time="2025-05-13T08:37:05.921122800Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 13 08:37:05.921185 env[1160]: time="2025-05-13T08:37:05.921137728Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 13 08:37:05.921185 env[1160]: time="2025-05-13T08:37:05.921149991Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 13 08:37:05.921237 env[1160]: time="2025-05-13T08:37:05.921187772Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 13 08:37:05.921237 env[1160]: time="2025-05-13T08:37:05.921223308Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 13 08:37:05.921546 env[1160]: time="2025-05-13T08:37:05.921463148Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 13 08:37:05.926074 env[1160]: time="2025-05-13T08:37:05.921551143Z" level=info msg="Connect containerd service" May 13 08:37:05.926074 env[1160]: time="2025-05-13T08:37:05.921599484Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 13 08:37:05.926074 env[1160]: time="2025-05-13T08:37:05.922275492Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 08:37:05.926074 env[1160]: time="2025-05-13T08:37:05.922433298Z" level=info msg="Start subscribing containerd event" May 13 08:37:05.926074 env[1160]: time="2025-05-13T08:37:05.922524809Z" level=info msg="Start recovering state" May 13 08:37:05.926074 env[1160]: time="2025-05-13T08:37:05.922545167Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 13 08:37:05.926074 env[1160]: time="2025-05-13T08:37:05.922588138Z" level=info msg="Start event monitor" May 13 08:37:05.926074 env[1160]: time="2025-05-13T08:37:05.922602295Z" level=info msg="Start snapshots syncer" May 13 08:37:05.926074 env[1160]: time="2025-05-13T08:37:05.922608747Z" level=info msg=serving... address=/run/containerd/containerd.sock May 13 08:37:05.926074 env[1160]: time="2025-05-13T08:37:05.922613836Z" level=info msg="Start cni network conf syncer for default" May 13 08:37:05.926074 env[1160]: time="2025-05-13T08:37:05.922623725Z" level=info msg="Start streaming server" May 13 08:37:05.926074 env[1160]: time="2025-05-13T08:37:05.923856316Z" level=info msg="containerd successfully booted in 0.122657s" May 13 08:37:05.922739 systemd[1]: Started containerd.service. May 13 08:37:06.069696 systemd-networkd[993]: eth0: Gained IPv6LL May 13 08:37:06.071672 systemd[1]: Finished systemd-networkd-wait-online.service. May 13 08:37:06.072469 systemd[1]: Reached target network-online.target. May 13 08:37:06.074659 systemd[1]: Starting kubelet.service... May 13 08:37:06.291553 tar[1156]: linux-amd64/LICENSE May 13 08:37:06.291770 tar[1156]: linux-amd64/README.md May 13 08:37:06.297170 systemd[1]: Finished prepare-helm.service. May 13 08:37:06.464536 locksmithd[1197]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 13 08:37:07.293321 sshd_keygen[1165]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 13 08:37:07.317283 systemd[1]: Finished sshd-keygen.service. May 13 08:37:07.321804 systemd[1]: Starting issuegen.service... May 13 08:37:07.325251 systemd[1]: Started sshd@0-172.24.4.14:22-172.24.4.1:60266.service. May 13 08:37:07.329680 systemd[1]: issuegen.service: Deactivated successfully. May 13 08:37:07.329848 systemd[1]: Finished issuegen.service. May 13 08:37:07.331806 systemd[1]: Starting systemd-user-sessions.service... May 13 08:37:07.340477 systemd[1]: Finished systemd-user-sessions.service. May 13 08:37:07.342372 systemd[1]: Started getty@tty1.service. May 13 08:37:07.343998 systemd[1]: Started serial-getty@ttyS0.service. May 13 08:37:07.344756 systemd[1]: Reached target getty.target. May 13 08:37:07.590994 systemd[1]: Started kubelet.service. May 13 08:37:08.264713 sshd[1215]: Accepted publickey for core from 172.24.4.1 port 60266 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:37:08.269779 sshd[1215]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:37:08.303436 systemd-logind[1147]: New session 1 of user core. May 13 08:37:08.305766 systemd[1]: Created slice user-500.slice. May 13 08:37:08.309419 systemd[1]: Starting user-runtime-dir@500.service... May 13 08:37:08.330112 systemd[1]: Finished user-runtime-dir@500.service. May 13 08:37:08.332636 systemd[1]: Starting user@500.service... May 13 08:37:08.343796 (systemd)[1231]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 13 08:37:08.435803 systemd[1231]: Queued start job for default target default.target. May 13 08:37:08.436271 systemd[1231]: Reached target paths.target. May 13 08:37:08.436294 systemd[1231]: Reached target sockets.target. May 13 08:37:08.436308 systemd[1231]: Reached target timers.target. May 13 08:37:08.436333 systemd[1231]: Reached target basic.target. May 13 08:37:08.436370 systemd[1231]: Reached target default.target. May 13 08:37:08.436395 systemd[1231]: Startup finished in 80ms. May 13 08:37:08.436447 systemd[1]: Started user@500.service. May 13 08:37:08.437944 systemd[1]: Started session-1.scope. May 13 08:37:08.837855 kubelet[1224]: E0513 08:37:08.837804 1224 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 08:37:08.839418 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 08:37:08.839561 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 08:37:08.839761 systemd[1]: kubelet.service: Consumed 1.661s CPU time. May 13 08:37:08.918423 systemd[1]: Started sshd@1-172.24.4.14:22-172.24.4.1:60276.service. May 13 08:37:10.507097 sshd[1241]: Accepted publickey for core from 172.24.4.1 port 60276 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:37:10.510201 sshd[1241]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:37:10.520285 systemd-logind[1147]: New session 2 of user core. May 13 08:37:10.521036 systemd[1]: Started session-2.scope. May 13 08:37:11.151133 sshd[1241]: pam_unix(sshd:session): session closed for user core May 13 08:37:11.157314 systemd[1]: Started sshd@2-172.24.4.14:22-172.24.4.1:60284.service. May 13 08:37:11.162160 systemd[1]: sshd@1-172.24.4.14:22-172.24.4.1:60276.service: Deactivated successfully. May 13 08:37:11.165266 systemd[1]: session-2.scope: Deactivated successfully. May 13 08:37:11.167367 systemd-logind[1147]: Session 2 logged out. Waiting for processes to exit. May 13 08:37:11.169910 systemd-logind[1147]: Removed session 2. May 13 08:37:12.267299 sshd[1246]: Accepted publickey for core from 172.24.4.1 port 60284 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:37:12.269848 sshd[1246]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:37:12.279898 systemd-logind[1147]: New session 3 of user core. May 13 08:37:12.280634 systemd[1]: Started session-3.scope. May 13 08:37:12.783959 coreos-metadata[1135]: May 13 08:37:12.783 WARN failed to locate config-drive, using the metadata service API instead May 13 08:37:12.896019 coreos-metadata[1135]: May 13 08:37:12.895 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 May 13 08:37:12.908792 sshd[1246]: pam_unix(sshd:session): session closed for user core May 13 08:37:12.911904 systemd[1]: sshd@2-172.24.4.14:22-172.24.4.1:60284.service: Deactivated successfully. May 13 08:37:12.913438 systemd[1]: session-3.scope: Deactivated successfully. May 13 08:37:12.914463 systemd-logind[1147]: Session 3 logged out. Waiting for processes to exit. May 13 08:37:12.915469 systemd-logind[1147]: Removed session 3. May 13 08:37:13.227610 coreos-metadata[1135]: May 13 08:37:13.227 INFO Fetch successful May 13 08:37:13.227610 coreos-metadata[1135]: May 13 08:37:13.227 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 May 13 08:37:13.244050 coreos-metadata[1135]: May 13 08:37:13.243 INFO Fetch successful May 13 08:37:13.249787 unknown[1135]: wrote ssh authorized keys file for user: core May 13 08:37:13.284097 update-ssh-keys[1254]: Updated "/home/core/.ssh/authorized_keys" May 13 08:37:13.285646 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 13 08:37:13.286532 systemd[1]: Reached target multi-user.target. May 13 08:37:13.289262 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 13 08:37:13.306055 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 13 08:37:13.306387 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 13 08:37:13.307444 systemd[1]: Startup finished in 980ms (kernel) + 8.159s (initrd) + 13.877s (userspace) = 23.017s. May 13 08:37:19.091037 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 13 08:37:19.091477 systemd[1]: Stopped kubelet.service. May 13 08:37:19.091606 systemd[1]: kubelet.service: Consumed 1.661s CPU time. May 13 08:37:19.094161 systemd[1]: Starting kubelet.service... May 13 08:37:19.363085 systemd[1]: Started kubelet.service. May 13 08:37:19.462119 kubelet[1260]: E0513 08:37:19.462081 1260 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 08:37:19.468326 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 08:37:19.468669 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 08:37:22.920561 systemd[1]: Started sshd@3-172.24.4.14:22-172.24.4.1:36702.service. May 13 08:37:24.108396 sshd[1267]: Accepted publickey for core from 172.24.4.1 port 36702 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:37:24.111880 sshd[1267]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:37:24.121783 systemd-logind[1147]: New session 4 of user core. May 13 08:37:24.122521 systemd[1]: Started session-4.scope. May 13 08:37:24.751352 sshd[1267]: pam_unix(sshd:session): session closed for user core May 13 08:37:24.760958 systemd[1]: Started sshd@4-172.24.4.14:22-172.24.4.1:42632.service. May 13 08:37:24.762169 systemd[1]: sshd@3-172.24.4.14:22-172.24.4.1:36702.service: Deactivated successfully. May 13 08:37:24.763708 systemd[1]: session-4.scope: Deactivated successfully. May 13 08:37:24.765936 systemd-logind[1147]: Session 4 logged out. Waiting for processes to exit. May 13 08:37:24.768233 systemd-logind[1147]: Removed session 4. May 13 08:37:25.949377 sshd[1272]: Accepted publickey for core from 172.24.4.1 port 42632 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:37:25.951976 sshd[1272]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:37:25.962301 systemd-logind[1147]: New session 5 of user core. May 13 08:37:25.963090 systemd[1]: Started session-5.scope. May 13 08:37:26.591262 sshd[1272]: pam_unix(sshd:session): session closed for user core May 13 08:37:26.599403 systemd[1]: Started sshd@5-172.24.4.14:22-172.24.4.1:42644.service. May 13 08:37:26.601859 systemd[1]: sshd@4-172.24.4.14:22-172.24.4.1:42632.service: Deactivated successfully. May 13 08:37:26.603272 systemd[1]: session-5.scope: Deactivated successfully. May 13 08:37:26.607258 systemd-logind[1147]: Session 5 logged out. Waiting for processes to exit. May 13 08:37:26.610168 systemd-logind[1147]: Removed session 5. May 13 08:37:27.795045 sshd[1278]: Accepted publickey for core from 172.24.4.1 port 42644 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:37:27.798201 sshd[1278]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:37:27.808308 systemd-logind[1147]: New session 6 of user core. May 13 08:37:27.809009 systemd[1]: Started session-6.scope. May 13 08:37:28.440802 sshd[1278]: pam_unix(sshd:session): session closed for user core May 13 08:37:28.444821 systemd[1]: Started sshd@6-172.24.4.14:22-172.24.4.1:42650.service. May 13 08:37:28.450178 systemd[1]: sshd@5-172.24.4.14:22-172.24.4.1:42644.service: Deactivated successfully. May 13 08:37:28.451836 systemd[1]: session-6.scope: Deactivated successfully. May 13 08:37:28.454480 systemd-logind[1147]: Session 6 logged out. Waiting for processes to exit. May 13 08:37:28.456900 systemd-logind[1147]: Removed session 6. May 13 08:37:29.534147 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 13 08:37:29.534812 systemd[1]: Stopped kubelet.service. May 13 08:37:29.537624 systemd[1]: Starting kubelet.service... May 13 08:37:29.687014 sshd[1284]: Accepted publickey for core from 172.24.4.1 port 42650 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:37:29.689679 sshd[1284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:37:29.700010 systemd-logind[1147]: New session 7 of user core. May 13 08:37:29.700742 systemd[1]: Started session-7.scope. May 13 08:37:29.811364 systemd[1]: Started kubelet.service. May 13 08:37:29.905101 kubelet[1292]: E0513 08:37:29.905014 1292 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 08:37:29.908465 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 08:37:29.908792 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 08:37:30.145326 sudo[1297]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 13 08:37:30.146804 sudo[1297]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 08:37:30.157759 dbus-daemon[1136]: \xd0\u001dQ\u0011\xb4U: received setenforce notice (enforcing=-2075814544) May 13 08:37:30.162768 sudo[1297]: pam_unix(sudo:session): session closed for user root May 13 08:37:30.390292 sshd[1284]: pam_unix(sshd:session): session closed for user core May 13 08:37:30.396633 systemd[1]: Started sshd@7-172.24.4.14:22-172.24.4.1:42658.service. May 13 08:37:30.401263 systemd[1]: sshd@6-172.24.4.14:22-172.24.4.1:42650.service: Deactivated successfully. May 13 08:37:30.402858 systemd[1]: session-7.scope: Deactivated successfully. May 13 08:37:30.405921 systemd-logind[1147]: Session 7 logged out. Waiting for processes to exit. May 13 08:37:30.408660 systemd-logind[1147]: Removed session 7. May 13 08:37:31.553935 sshd[1300]: Accepted publickey for core from 172.24.4.1 port 42658 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:37:31.557176 sshd[1300]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:37:31.567661 systemd[1]: Started session-8.scope. May 13 08:37:31.568914 systemd-logind[1147]: New session 8 of user core. May 13 08:37:32.028472 sudo[1305]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 13 08:37:32.030198 sudo[1305]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 08:37:32.036199 sudo[1305]: pam_unix(sudo:session): session closed for user root May 13 08:37:32.046722 sudo[1304]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 13 08:37:32.047239 sudo[1304]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 08:37:32.067284 systemd[1]: Stopping audit-rules.service... May 13 08:37:32.067000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 08:37:32.070030 auditctl[1308]: No rules May 13 08:37:32.072446 kernel: kauditd_printk_skb: 173 callbacks suppressed May 13 08:37:32.072589 kernel: audit: type=1305 audit(1747125452.067:212): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 08:37:32.073143 systemd[1]: audit-rules.service: Deactivated successfully. May 13 08:37:32.073466 systemd[1]: Stopped audit-rules.service. May 13 08:37:32.067000 audit[1308]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffea52b4a90 a2=420 a3=0 items=0 ppid=1 pid=1308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:32.080926 systemd[1]: Starting audit-rules.service... May 13 08:37:32.095391 kernel: audit: type=1300 audit(1747125452.067:212): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffea52b4a90 a2=420 a3=0 items=0 ppid=1 pid=1308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:32.067000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 13 08:37:32.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:32.112386 kernel: audit: type=1327 audit(1747125452.067:212): proctitle=2F7362696E2F617564697463746C002D44 May 13 08:37:32.112584 kernel: audit: type=1131 audit(1747125452.072:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:32.131720 augenrules[1325]: No rules May 13 08:37:32.133330 systemd[1]: Finished audit-rules.service. May 13 08:37:32.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:32.146548 kernel: audit: type=1130 audit(1747125452.132:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:32.146623 sudo[1304]: pam_unix(sudo:session): session closed for user root May 13 08:37:32.145000 audit[1304]: USER_END pid=1304 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 08:37:32.161614 kernel: audit: type=1106 audit(1747125452.145:215): pid=1304 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 08:37:32.161723 kernel: audit: type=1104 audit(1747125452.145:216): pid=1304 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 08:37:32.145000 audit[1304]: CRED_DISP pid=1304 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 08:37:32.435842 sshd[1300]: pam_unix(sshd:session): session closed for user core May 13 08:37:32.439000 audit[1300]: USER_END pid=1300 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:37:32.444440 systemd[1]: Started sshd@8-172.24.4.14:22-172.24.4.1:42668.service. May 13 08:37:32.466247 kernel: audit: type=1106 audit(1747125452.439:217): pid=1300 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:37:32.466364 kernel: audit: type=1104 audit(1747125452.439:218): pid=1300 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:37:32.439000 audit[1300]: CRED_DISP pid=1300 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:37:32.463985 systemd[1]: sshd@7-172.24.4.14:22-172.24.4.1:42658.service: Deactivated successfully. May 13 08:37:32.465365 systemd[1]: session-8.scope: Deactivated successfully. May 13 08:37:32.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.14:22-172.24.4.1:42668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:32.492530 kernel: audit: type=1130 audit(1747125452.443:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.14:22-172.24.4.1:42668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:32.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.14:22-172.24.4.1:42658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:32.492474 systemd-logind[1147]: Session 8 logged out. Waiting for processes to exit. May 13 08:37:32.494896 systemd-logind[1147]: Removed session 8. May 13 08:37:33.632000 audit[1330]: USER_ACCT pid=1330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:37:33.634722 sshd[1330]: Accepted publickey for core from 172.24.4.1 port 42668 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:37:33.635000 audit[1330]: CRED_ACQ pid=1330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:37:33.635000 audit[1330]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcb9eba20 a2=3 a3=0 items=0 ppid=1 pid=1330 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:33.635000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 08:37:33.637971 sshd[1330]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:37:33.649105 systemd[1]: Started session-9.scope. May 13 08:37:33.650663 systemd-logind[1147]: New session 9 of user core. May 13 08:37:33.660000 audit[1330]: USER_START pid=1330 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:37:33.664000 audit[1333]: CRED_ACQ pid=1333 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:37:34.106000 audit[1334]: USER_ACCT pid=1334 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 08:37:34.107000 audit[1334]: CRED_REFR pid=1334 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 08:37:34.108268 sudo[1334]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 13 08:37:34.109590 sudo[1334]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 08:37:34.112000 audit[1334]: USER_START pid=1334 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 08:37:34.166840 systemd[1]: Starting docker.service... May 13 08:37:34.249234 env[1344]: time="2025-05-13T08:37:34.249151681Z" level=info msg="Starting up" May 13 08:37:34.252736 env[1344]: time="2025-05-13T08:37:34.252681771Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 13 08:37:34.252925 env[1344]: time="2025-05-13T08:37:34.252888629Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 13 08:37:34.253114 env[1344]: time="2025-05-13T08:37:34.253071202Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 13 08:37:34.253253 env[1344]: time="2025-05-13T08:37:34.253222175Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 13 08:37:34.256125 env[1344]: time="2025-05-13T08:37:34.256081718Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 13 08:37:34.256316 env[1344]: time="2025-05-13T08:37:34.256282555Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 13 08:37:34.256470 env[1344]: time="2025-05-13T08:37:34.256433127Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 13 08:37:34.256682 env[1344]: time="2025-05-13T08:37:34.256646988Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 13 08:37:34.314717 env[1344]: time="2025-05-13T08:37:34.314657647Z" level=info msg="Loading containers: start." May 13 08:37:34.388000 audit[1374]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1374 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:34.388000 audit[1374]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc29ca3960 a2=0 a3=7ffc29ca394c items=0 ppid=1344 pid=1374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:34.388000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 13 08:37:34.390000 audit[1376]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1376 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:34.390000 audit[1376]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd2f38cf70 a2=0 a3=7ffd2f38cf5c items=0 ppid=1344 pid=1376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:34.390000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 13 08:37:34.393000 audit[1378]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1378 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:34.393000 audit[1378]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff84879fc0 a2=0 a3=7fff84879fac items=0 ppid=1344 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:34.393000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 08:37:34.397000 audit[1380]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1380 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:34.397000 audit[1380]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff75c8b430 a2=0 a3=7fff75c8b41c items=0 ppid=1344 pid=1380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:34.397000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 13 08:37:34.405000 audit[1382]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1382 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:34.405000 audit[1382]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc0e539f10 a2=0 a3=7ffc0e539efc items=0 ppid=1344 pid=1382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:34.405000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 13 08:37:34.419000 audit[1387]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1387 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:34.419000 audit[1387]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe2be657c0 a2=0 a3=7ffe2be657ac items=0 ppid=1344 pid=1387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:34.419000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 13 08:37:34.433000 audit[1389]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1389 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:34.433000 audit[1389]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffccc5972d0 a2=0 a3=7ffccc5972bc items=0 ppid=1344 pid=1389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:34.433000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 13 08:37:34.439000 audit[1391]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:34.439000 audit[1391]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd4a92fb30 a2=0 a3=7ffd4a92fb1c items=0 ppid=1344 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:34.439000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 13 08:37:34.442000 audit[1393]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:34.442000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd1caac4b0 a2=0 a3=7ffd1caac49c items=0 ppid=1344 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:34.442000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 08:37:34.453000 audit[1397]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:34.453000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd0ca21a80 a2=0 a3=7ffd0ca21a6c items=0 ppid=1344 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:34.453000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 13 08:37:34.458000 audit[1398]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1398 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:34.458000 audit[1398]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd1c6e2c80 a2=0 a3=7ffd1c6e2c6c items=0 ppid=1344 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:34.458000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 08:37:34.471953 kernel: Initializing XFRM netlink socket May 13 08:37:34.511711 env[1344]: time="2025-05-13T08:37:34.511658172Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 13 08:37:34.543000 audit[1406]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:34.543000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc160ebec0 a2=0 a3=7ffc160ebeac items=0 ppid=1344 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:34.543000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 13 08:37:34.556000 audit[1409]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:34.556000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe8d35fe60 a2=0 a3=7ffe8d35fe4c items=0 ppid=1344 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:34.556000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 13 08:37:34.563000 audit[1412]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:34.563000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffeec1d2f80 a2=0 a3=7ffeec1d2f6c items=0 ppid=1344 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:34.563000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 13 08:37:34.567000 audit[1414]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:34.567000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffca7c45df0 a2=0 a3=7ffca7c45ddc items=0 ppid=1344 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:34.567000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 13 08:37:34.572000 audit[1416]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:34.572000 audit[1416]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fffc24e6bb0 a2=0 a3=7fffc24e6b9c items=0 ppid=1344 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:34.572000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 13 08:37:34.576000 audit[1418]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:34.576000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc80880910 a2=0 a3=7ffc808808fc items=0 ppid=1344 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:34.576000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 13 08:37:34.581000 audit[1420]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:34.581000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe79744cf0 a2=0 a3=7ffe79744cdc items=0 ppid=1344 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:34.581000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 13 08:37:34.591000 audit[1423]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:34.591000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd62e04430 a2=0 a3=7ffd62e0441c items=0 ppid=1344 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:34.591000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 13 08:37:34.593000 audit[1425]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:34.593000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffef6d4ea10 a2=0 a3=7ffef6d4e9fc items=0 ppid=1344 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:34.593000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 08:37:34.595000 audit[1427]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:34.595000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd305c7110 a2=0 a3=7ffd305c70fc items=0 ppid=1344 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:34.595000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 13 08:37:34.597000 audit[1429]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:34.597000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe088fee60 a2=0 a3=7ffe088fee4c items=0 ppid=1344 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:34.597000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 13 08:37:34.599338 systemd-networkd[993]: docker0: Link UP May 13 08:37:34.610000 audit[1433]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:34.610000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc081b0030 a2=0 a3=7ffc081b001c items=0 ppid=1344 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:34.610000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 13 08:37:34.614000 audit[1434]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:34.614000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcb5fbf7a0 a2=0 a3=7ffcb5fbf78c items=0 ppid=1344 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:34.614000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 08:37:34.616637 env[1344]: time="2025-05-13T08:37:34.616614006Z" level=info msg="Loading containers: done." May 13 08:37:34.638005 env[1344]: time="2025-05-13T08:37:34.637980489Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 13 08:37:34.638297 env[1344]: time="2025-05-13T08:37:34.638279650Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 13 08:37:34.638528 env[1344]: time="2025-05-13T08:37:34.638477541Z" level=info msg="Daemon has completed initialization" May 13 08:37:34.663158 systemd[1]: Started docker.service. May 13 08:37:34.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:34.680286 env[1344]: time="2025-05-13T08:37:34.680235779Z" level=info msg="API listen on /run/docker.sock" May 13 08:37:36.487327 env[1160]: time="2025-05-13T08:37:36.487177427Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\"" May 13 08:37:37.227699 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2152587360.mount: Deactivated successfully. May 13 08:37:39.455886 env[1160]: time="2025-05-13T08:37:39.455808816Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:39.458542 env[1160]: time="2025-05-13T08:37:39.458472922Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:39.463647 env[1160]: time="2025-05-13T08:37:39.463604982Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:39.467229 env[1160]: time="2025-05-13T08:37:39.467182660Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:30090db6a7d53799163ce82dae9e8ddb645fd47db93f2ec9da0cc787fd825625,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:39.468928 env[1160]: time="2025-05-13T08:37:39.468876047Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\" returns image reference \"sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc\"" May 13 08:37:39.470843 env[1160]: time="2025-05-13T08:37:39.470715124Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\"" May 13 08:37:40.159886 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 13 08:37:40.160093 systemd[1]: Stopped kubelet.service. May 13 08:37:40.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:40.173155 kernel: kauditd_printk_skb: 84 callbacks suppressed May 13 08:37:40.173301 kernel: audit: type=1130 audit(1747125460.158:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:40.173368 kernel: audit: type=1131 audit(1747125460.158:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:40.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:40.163395 systemd[1]: Starting kubelet.service... May 13 08:37:40.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:40.249193 systemd[1]: Started kubelet.service. May 13 08:37:40.254606 kernel: audit: type=1130 audit(1747125460.247:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:40.486341 kubelet[1472]: E0513 08:37:40.486003 1472 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 08:37:40.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 08:37:40.487869 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 08:37:40.487988 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 08:37:40.493517 kernel: audit: type=1131 audit(1747125460.486:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 08:37:41.890742 env[1160]: time="2025-05-13T08:37:41.890705287Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:41.899734 env[1160]: time="2025-05-13T08:37:41.899690331Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:41.903626 env[1160]: time="2025-05-13T08:37:41.903605356Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:41.907128 env[1160]: time="2025-05-13T08:37:41.907107420Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:29eaddc64792a689df48506e78bbc641d063ac8bb92d2e66ae2ad05977420747,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:41.909327 env[1160]: time="2025-05-13T08:37:41.909256388Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\" returns image reference \"sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f\"" May 13 08:37:41.910894 env[1160]: time="2025-05-13T08:37:41.910835375Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\"" May 13 08:37:43.787630 env[1160]: time="2025-05-13T08:37:43.787549751Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:43.790363 env[1160]: time="2025-05-13T08:37:43.790311152Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:43.793572 env[1160]: time="2025-05-13T08:37:43.793545078Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:43.797146 env[1160]: time="2025-05-13T08:37:43.797125090Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:22994a2632e81059720480b9f6bdeb133b08d58492d0b36dfd6e9768b159b22a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:43.799201 env[1160]: time="2025-05-13T08:37:43.799128753Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\" returns image reference \"sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8\"" May 13 08:37:43.800017 env[1160]: time="2025-05-13T08:37:43.799966904Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" May 13 08:37:45.268876 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount977106677.mount: Deactivated successfully. May 13 08:37:46.216836 env[1160]: time="2025-05-13T08:37:46.216796056Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:46.221287 env[1160]: time="2025-05-13T08:37:46.221264260Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:46.225552 env[1160]: time="2025-05-13T08:37:46.225450110Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:46.227275 env[1160]: time="2025-05-13T08:37:46.227225728Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:dd0c9a37670f209947b1ed880f06a2e93e1d41da78c037f52f94b13858769838,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:46.227942 env[1160]: time="2025-05-13T08:37:46.227914330Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" returns image reference \"sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2\"" May 13 08:37:46.228356 env[1160]: time="2025-05-13T08:37:46.228337122Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 13 08:37:46.796037 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1689012735.mount: Deactivated successfully. May 13 08:37:48.605908 env[1160]: time="2025-05-13T08:37:48.605829593Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:48.608750 env[1160]: time="2025-05-13T08:37:48.608699350Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:48.613018 env[1160]: time="2025-05-13T08:37:48.612974808Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:48.618201 env[1160]: time="2025-05-13T08:37:48.618155868Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:48.620521 env[1160]: time="2025-05-13T08:37:48.620422533Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 13 08:37:48.621463 env[1160]: time="2025-05-13T08:37:48.621352914Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 13 08:37:49.196743 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2376296853.mount: Deactivated successfully. May 13 08:37:49.208342 env[1160]: time="2025-05-13T08:37:49.208276490Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:49.211806 env[1160]: time="2025-05-13T08:37:49.211754418Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:49.215579 env[1160]: time="2025-05-13T08:37:49.215472751Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:49.221424 env[1160]: time="2025-05-13T08:37:49.221361904Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:49.222295 env[1160]: time="2025-05-13T08:37:49.222234294Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 13 08:37:49.223552 env[1160]: time="2025-05-13T08:37:49.223471394Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" May 13 08:37:49.868353 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2264080566.mount: Deactivated successfully. May 13 08:37:50.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:50.719676 kernel: audit: type=1130 audit(1747125470.710:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:50.710888 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 13 08:37:50.711163 systemd[1]: Stopped kubelet.service. May 13 08:37:50.719174 systemd[1]: Starting kubelet.service... May 13 08:37:50.729372 kernel: audit: type=1131 audit(1747125470.710:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:50.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:50.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:50.811934 systemd[1]: Started kubelet.service. May 13 08:37:50.819536 kernel: audit: type=1130 audit(1747125470.812:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:51.299830 kubelet[1482]: E0513 08:37:51.299762 1482 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 08:37:51.302462 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 08:37:51.302608 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 08:37:51.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 08:37:51.308085 update_engine[1149]: I0513 08:37:51.308050 1149 update_attempter.cc:509] Updating boot flags... May 13 08:37:51.308800 kernel: audit: type=1131 audit(1747125471.302:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 08:37:53.523520 env[1160]: time="2025-05-13T08:37:53.523464138Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:53.527745 env[1160]: time="2025-05-13T08:37:53.527724796Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:53.533355 env[1160]: time="2025-05-13T08:37:53.533286802Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:53.540846 env[1160]: time="2025-05-13T08:37:53.540786336Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:37:53.542082 env[1160]: time="2025-05-13T08:37:53.542053096Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" May 13 08:37:57.332159 systemd[1]: Stopped kubelet.service. May 13 08:37:57.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:57.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:57.356723 kernel: audit: type=1130 audit(1747125477.331:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:57.356770 kernel: audit: type=1131 audit(1747125477.332:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:57.357392 systemd[1]: Starting kubelet.service... May 13 08:37:57.392605 systemd[1]: Reloading. May 13 08:37:57.480603 /usr/lib/systemd/system-generators/torcx-generator[1545]: time="2025-05-13T08:37:57Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 08:37:57.480661 /usr/lib/systemd/system-generators/torcx-generator[1545]: time="2025-05-13T08:37:57Z" level=info msg="torcx already run" May 13 08:37:57.568627 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 08:37:57.568644 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 08:37:57.592074 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 08:37:57.676459 kernel: audit: type=1400 audit(1747125477.661:264): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.680541 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 13 08:37:57.680656 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 13 08:37:57.680836 kernel: audit: backlog limit exceeded May 13 08:37:57.681839 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 13 08:37:57.683120 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 May 13 08:37:57.698931 kernel: audit: type=1400 audit(1747125477.661:265): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.699049 kernel: audit: backlog limit exceeded May 13 08:37:57.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.673000 audit: BPF prog-id=46 op=LOAD May 13 08:37:57.673000 audit: BPF prog-id=39 op=UNLOAD May 13 08:37:57.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.673000 audit: BPF prog-id=47 op=LOAD May 13 08:37:57.673000 audit: BPF prog-id=30 op=UNLOAD May 13 08:37:57.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.674000 audit: BPF prog-id=48 op=LOAD May 13 08:37:57.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.674000 audit: BPF prog-id=49 op=LOAD May 13 08:37:57.674000 audit: BPF prog-id=31 op=UNLOAD May 13 08:37:57.674000 audit: BPF prog-id=32 op=UNLOAD May 13 08:37:57.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.675000 audit: BPF prog-id=50 op=LOAD May 13 08:37:57.675000 audit: BPF prog-id=41 op=UNLOAD May 13 08:37:57.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.701000 audit: BPF prog-id=54 op=LOAD May 13 08:37:57.701000 audit: BPF prog-id=33 op=UNLOAD May 13 08:37:57.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:57.723554 systemd[1]: Started kubelet.service. May 13 08:37:57.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:57.724998 systemd[1]: Stopping kubelet.service... May 13 08:37:57.725478 systemd[1]: kubelet.service: Deactivated successfully. May 13 08:37:57.725672 systemd[1]: Stopped kubelet.service. May 13 08:37:57.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:57.727091 systemd[1]: Starting kubelet.service... May 13 08:37:57.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:37:57.803531 systemd[1]: Started kubelet.service. May 13 08:37:57.857585 kubelet[1599]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 08:37:57.857585 kubelet[1599]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 13 08:37:57.857585 kubelet[1599]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 08:37:58.038612 kubelet[1599]: I0513 08:37:58.038524 1599 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 08:37:58.503983 kubelet[1599]: I0513 08:37:58.503954 1599 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 13 08:37:58.504129 kubelet[1599]: I0513 08:37:58.504119 1599 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 08:37:58.504421 kubelet[1599]: I0513 08:37:58.504407 1599 server.go:929] "Client rotation is on, will bootstrap in background" May 13 08:37:59.034003 kubelet[1599]: E0513 08:37:59.033925 1599 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://172.24.4.14:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 172.24.4.14:6443: connect: connection refused" logger="UnhandledError" May 13 08:37:59.034709 kubelet[1599]: I0513 08:37:59.034029 1599 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 08:37:59.056455 kubelet[1599]: E0513 08:37:59.056393 1599 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 13 08:37:59.056800 kubelet[1599]: I0513 08:37:59.056765 1599 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 13 08:37:59.066661 kubelet[1599]: I0513 08:37:59.066622 1599 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 08:37:59.067043 kubelet[1599]: I0513 08:37:59.067013 1599 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 13 08:37:59.067549 kubelet[1599]: I0513 08:37:59.067441 1599 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 08:37:59.068110 kubelet[1599]: I0513 08:37:59.067707 1599 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-7-n-702ca96d1c.novalocal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 13 08:37:59.068447 kubelet[1599]: I0513 08:37:59.068417 1599 topology_manager.go:138] "Creating topology manager with none policy" May 13 08:37:59.068647 kubelet[1599]: I0513 08:37:59.068626 1599 container_manager_linux.go:300] "Creating device plugin manager" May 13 08:37:59.069037 kubelet[1599]: I0513 08:37:59.069008 1599 state_mem.go:36] "Initialized new in-memory state store" May 13 08:37:59.076775 kubelet[1599]: I0513 08:37:59.076715 1599 kubelet.go:408] "Attempting to sync node with API server" May 13 08:37:59.077008 kubelet[1599]: I0513 08:37:59.076982 1599 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 08:37:59.077281 kubelet[1599]: I0513 08:37:59.077223 1599 kubelet.go:314] "Adding apiserver pod source" May 13 08:37:59.077535 kubelet[1599]: I0513 08:37:59.077469 1599 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 08:37:59.099185 kubelet[1599]: W0513 08:37:59.099056 1599 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.24.4.14:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-n-702ca96d1c.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.14:6443: connect: connection refused May 13 08:37:59.099353 kubelet[1599]: E0513 08:37:59.099200 1599 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.24.4.14:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-n-702ca96d1c.novalocal&limit=500&resourceVersion=0\": dial tcp 172.24.4.14:6443: connect: connection refused" logger="UnhandledError" May 13 08:37:59.100797 kubelet[1599]: W0513 08:37:59.100217 1599 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.24.4.14:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.24.4.14:6443: connect: connection refused May 13 08:37:59.100797 kubelet[1599]: E0513 08:37:59.100317 1599 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.24.4.14:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.24.4.14:6443: connect: connection refused" logger="UnhandledError" May 13 08:37:59.100797 kubelet[1599]: I0513 08:37:59.100566 1599 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 08:37:59.111235 kubelet[1599]: I0513 08:37:59.111200 1599 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 08:37:59.116961 kubelet[1599]: W0513 08:37:59.116931 1599 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 13 08:37:59.118606 kubelet[1599]: I0513 08:37:59.118575 1599 server.go:1269] "Started kubelet" May 13 08:37:59.119000 audit[1599]: AVC avc: denied { mac_admin } for pid=1599 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:59.119000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 08:37:59.119000 audit[1599]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000752ab0 a1=c00076e498 a2=c000752a80 a3=25 items=0 ppid=1 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:59.119000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 08:37:59.121952 kubelet[1599]: I0513 08:37:59.121895 1599 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 13 08:37:59.120000 audit[1599]: AVC avc: denied { mac_admin } for pid=1599 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:59.120000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 08:37:59.120000 audit[1599]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007325e0 a1=c00076e4b0 a2=c000752b40 a3=25 items=0 ppid=1 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:59.120000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 08:37:59.122734 kubelet[1599]: I0513 08:37:59.122700 1599 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 13 08:37:59.123070 kubelet[1599]: I0513 08:37:59.123041 1599 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 08:37:59.128000 audit[1609]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1609 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:59.128000 audit[1609]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffd8856470 a2=0 a3=7fffd885645c items=0 ppid=1599 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:59.128000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 08:37:59.131000 audit[1610]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1610 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:59.131000 audit[1610]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff969d03c0 a2=0 a3=7fff969d03ac items=0 ppid=1599 pid=1610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:59.134321 kubelet[1599]: I0513 08:37:59.134106 1599 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 13 08:37:59.131000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 08:37:59.138603 kubelet[1599]: I0513 08:37:59.136765 1599 server.go:460] "Adding debug handlers to kubelet server" May 13 08:37:59.139070 kubelet[1599]: E0513 08:37:59.135887 1599 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.24.4.14:6443/api/v1/namespaces/default/events\": dial tcp 172.24.4.14:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-7-n-702ca96d1c.novalocal.183f095dd8e41aed default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-7-n-702ca96d1c.novalocal,UID:ci-3510-3-7-n-702ca96d1c.novalocal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-7-n-702ca96d1c.novalocal,},FirstTimestamp:2025-05-13 08:37:59.118478061 +0000 UTC m=+1.311361879,LastTimestamp:2025-05-13 08:37:59.118478061 +0000 UTC m=+1.311361879,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-7-n-702ca96d1c.novalocal,}" May 13 08:37:59.140925 kubelet[1599]: I0513 08:37:59.139796 1599 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 08:37:59.141335 kubelet[1599]: I0513 08:37:59.141240 1599 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 13 08:37:59.145019 kubelet[1599]: I0513 08:37:59.143784 1599 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 08:37:59.148018 kubelet[1599]: I0513 08:37:59.147991 1599 volume_manager.go:289] "Starting Kubelet Volume Manager" May 13 08:37:59.150241 kubelet[1599]: I0513 08:37:59.148312 1599 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 13 08:37:59.150619 kubelet[1599]: I0513 08:37:59.150591 1599 reconciler.go:26] "Reconciler: start to sync state" May 13 08:37:59.150857 kubelet[1599]: W0513 08:37:59.149215 1599 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.24.4.14:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.14:6443: connect: connection refused May 13 08:37:59.151148 kubelet[1599]: E0513 08:37:59.151071 1599 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.24.4.14:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.24.4.14:6443: connect: connection refused" logger="UnhandledError" May 13 08:37:59.151347 kubelet[1599]: I0513 08:37:59.149746 1599 factory.go:221] Registration of the systemd container factory successfully May 13 08:37:59.151813 kubelet[1599]: I0513 08:37:59.151778 1599 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 08:37:59.152300 kubelet[1599]: E0513 08:37:59.148595 1599 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510-3-7-n-702ca96d1c.novalocal\" not found" May 13 08:37:59.154064 kubelet[1599]: E0513 08:37:59.153994 1599 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 08:37:59.154731 kubelet[1599]: I0513 08:37:59.154698 1599 factory.go:221] Registration of the containerd container factory successfully May 13 08:37:59.154000 audit[1613]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1613 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:59.154000 audit[1613]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff064ba2d0 a2=0 a3=7fff064ba2bc items=0 ppid=1599 pid=1613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:59.154000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 08:37:59.158674 kubelet[1599]: E0513 08:37:59.158613 1599 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-n-702ca96d1c.novalocal?timeout=10s\": dial tcp 172.24.4.14:6443: connect: connection refused" interval="200ms" May 13 08:37:59.170000 audit[1616]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1616 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:59.170000 audit[1616]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd3ec60000 a2=0 a3=7ffd3ec5ffec items=0 ppid=1599 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:59.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 08:37:59.186697 kubelet[1599]: I0513 08:37:59.186676 1599 cpu_manager.go:214] "Starting CPU manager" policy="none" May 13 08:37:59.186697 kubelet[1599]: I0513 08:37:59.186693 1599 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 13 08:37:59.186823 kubelet[1599]: I0513 08:37:59.186713 1599 state_mem.go:36] "Initialized new in-memory state store" May 13 08:37:59.186000 audit[1621]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1621 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:59.186000 audit[1621]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff8d9d1e50 a2=0 a3=7fff8d9d1e3c items=0 ppid=1599 pid=1621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:59.186000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 13 08:37:59.187000 audit[1622]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1622 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:37:59.187000 audit[1622]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd39f59d70 a2=0 a3=7ffd39f59d5c items=0 ppid=1599 pid=1622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:59.187000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 08:37:59.189100 kubelet[1599]: I0513 08:37:59.187805 1599 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 08:37:59.189100 kubelet[1599]: I0513 08:37:59.188648 1599 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 08:37:59.189100 kubelet[1599]: I0513 08:37:59.188679 1599 status_manager.go:217] "Starting to sync pod status with apiserver" May 13 08:37:59.189100 kubelet[1599]: I0513 08:37:59.188702 1599 kubelet.go:2321] "Starting kubelet main sync loop" May 13 08:37:59.189100 kubelet[1599]: E0513 08:37:59.188752 1599 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 13 08:37:59.188000 audit[1623]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1623 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:59.188000 audit[1623]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc63d9140 a2=0 a3=7ffcc63d912c items=0 ppid=1599 pid=1623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:59.188000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 08:37:59.190282 kubelet[1599]: W0513 08:37:59.190260 1599 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.24.4.14:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.14:6443: connect: connection refused May 13 08:37:59.190405 kubelet[1599]: E0513 08:37:59.190386 1599 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.24.4.14:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.24.4.14:6443: connect: connection refused" logger="UnhandledError" May 13 08:37:59.189000 audit[1625]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1625 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:37:59.189000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc6d3d49e0 a2=0 a3=7ffc6d3d49cc items=0 ppid=1599 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:59.189000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 08:37:59.191606 kubelet[1599]: I0513 08:37:59.191586 1599 policy_none.go:49] "None policy: Start" May 13 08:37:59.192076 kubelet[1599]: I0513 08:37:59.192058 1599 memory_manager.go:170] "Starting memorymanager" policy="None" May 13 08:37:59.192131 kubelet[1599]: I0513 08:37:59.192086 1599 state_mem.go:35] "Initializing new in-memory state store" May 13 08:37:59.190000 audit[1626]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1626 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:59.190000 audit[1626]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd297c3fa0 a2=0 a3=7ffd297c3f8c items=0 ppid=1599 pid=1626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:59.190000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 08:37:59.192000 audit[1628]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1628 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:37:59.192000 audit[1628]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7ea8e660 a2=0 a3=7ffc7ea8e64c items=0 ppid=1599 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:59.192000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 08:37:59.192000 audit[1627]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1627 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:37:59.192000 audit[1627]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcdfe34be0 a2=0 a3=7ffcdfe34bcc items=0 ppid=1599 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:59.192000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 08:37:59.194000 audit[1629]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1629 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:37:59.194000 audit[1629]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff2ea3f3f0 a2=0 a3=7fff2ea3f3dc items=0 ppid=1599 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:59.194000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 08:37:59.197627 systemd[1]: Created slice kubepods.slice. May 13 08:37:59.201730 systemd[1]: Created slice kubepods-burstable.slice. May 13 08:37:59.204973 systemd[1]: Created slice kubepods-besteffort.slice. May 13 08:37:59.210188 kubelet[1599]: I0513 08:37:59.210165 1599 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 08:37:59.208000 audit[1599]: AVC avc: denied { mac_admin } for pid=1599 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:37:59.208000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 08:37:59.208000 audit[1599]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ab2f90 a1=c0006eba40 a2=c000ab2f60 a3=25 items=0 ppid=1 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:37:59.208000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 08:37:59.210441 kubelet[1599]: I0513 08:37:59.210227 1599 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 13 08:37:59.210441 kubelet[1599]: I0513 08:37:59.210327 1599 eviction_manager.go:189] "Eviction manager: starting control loop" May 13 08:37:59.210441 kubelet[1599]: I0513 08:37:59.210342 1599 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 08:37:59.210847 kubelet[1599]: I0513 08:37:59.210819 1599 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 08:37:59.212243 kubelet[1599]: E0513 08:37:59.212222 1599 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-7-n-702ca96d1c.novalocal\" not found" May 13 08:37:59.307838 systemd[1]: Created slice kubepods-burstable-pode0a42e4329d3a9cc72fcce5d44cfea19.slice. May 13 08:37:59.320562 kubelet[1599]: I0513 08:37:59.319103 1599 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:37:59.320562 kubelet[1599]: E0513 08:37:59.319974 1599 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.24.4.14:6443/api/v1/nodes\": dial tcp 172.24.4.14:6443: connect: connection refused" node="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:37:59.327758 systemd[1]: Created slice kubepods-burstable-podc8b2f2a4c3569fe46c1fde8dca02174f.slice. May 13 08:37:59.337361 systemd[1]: Created slice kubepods-burstable-pod6802707891943f284679eb48dc63d255.slice. May 13 08:37:59.352363 kubelet[1599]: I0513 08:37:59.352321 1599 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c8b2f2a4c3569fe46c1fde8dca02174f-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal\" (UID: \"c8b2f2a4c3569fe46c1fde8dca02174f\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:37:59.352728 kubelet[1599]: I0513 08:37:59.352685 1599 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c8b2f2a4c3569fe46c1fde8dca02174f-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal\" (UID: \"c8b2f2a4c3569fe46c1fde8dca02174f\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:37:59.353063 kubelet[1599]: I0513 08:37:59.352982 1599 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e0a42e4329d3a9cc72fcce5d44cfea19-k8s-certs\") pod \"kube-apiserver-ci-3510-3-7-n-702ca96d1c.novalocal\" (UID: \"e0a42e4329d3a9cc72fcce5d44cfea19\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:37:59.353353 kubelet[1599]: I0513 08:37:59.353314 1599 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e0a42e4329d3a9cc72fcce5d44cfea19-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-7-n-702ca96d1c.novalocal\" (UID: \"e0a42e4329d3a9cc72fcce5d44cfea19\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:37:59.353638 kubelet[1599]: I0513 08:37:59.353601 1599 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/c8b2f2a4c3569fe46c1fde8dca02174f-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal\" (UID: \"c8b2f2a4c3569fe46c1fde8dca02174f\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:37:59.353843 kubelet[1599]: I0513 08:37:59.353806 1599 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6802707891943f284679eb48dc63d255-kubeconfig\") pod \"kube-scheduler-ci-3510-3-7-n-702ca96d1c.novalocal\" (UID: \"6802707891943f284679eb48dc63d255\") " pod="kube-system/kube-scheduler-ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:37:59.354085 kubelet[1599]: I0513 08:37:59.354050 1599 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e0a42e4329d3a9cc72fcce5d44cfea19-ca-certs\") pod \"kube-apiserver-ci-3510-3-7-n-702ca96d1c.novalocal\" (UID: \"e0a42e4329d3a9cc72fcce5d44cfea19\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:37:59.354310 kubelet[1599]: I0513 08:37:59.354275 1599 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c8b2f2a4c3569fe46c1fde8dca02174f-ca-certs\") pod \"kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal\" (UID: \"c8b2f2a4c3569fe46c1fde8dca02174f\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:37:59.354556 kubelet[1599]: I0513 08:37:59.354520 1599 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c8b2f2a4c3569fe46c1fde8dca02174f-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal\" (UID: \"c8b2f2a4c3569fe46c1fde8dca02174f\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:37:59.360450 kubelet[1599]: E0513 08:37:59.360387 1599 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-n-702ca96d1c.novalocal?timeout=10s\": dial tcp 172.24.4.14:6443: connect: connection refused" interval="400ms" May 13 08:37:59.524107 kubelet[1599]: I0513 08:37:59.524036 1599 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:37:59.525516 kubelet[1599]: E0513 08:37:59.525421 1599 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.24.4.14:6443/api/v1/nodes\": dial tcp 172.24.4.14:6443: connect: connection refused" node="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:37:59.624841 env[1160]: time="2025-05-13T08:37:59.623862678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-7-n-702ca96d1c.novalocal,Uid:e0a42e4329d3a9cc72fcce5d44cfea19,Namespace:kube-system,Attempt:0,}" May 13 08:37:59.633841 env[1160]: time="2025-05-13T08:37:59.633772124Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal,Uid:c8b2f2a4c3569fe46c1fde8dca02174f,Namespace:kube-system,Attempt:0,}" May 13 08:37:59.642038 env[1160]: time="2025-05-13T08:37:59.641972840Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-7-n-702ca96d1c.novalocal,Uid:6802707891943f284679eb48dc63d255,Namespace:kube-system,Attempt:0,}" May 13 08:37:59.761241 kubelet[1599]: E0513 08:37:59.761127 1599 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-n-702ca96d1c.novalocal?timeout=10s\": dial tcp 172.24.4.14:6443: connect: connection refused" interval="800ms" May 13 08:37:59.929334 kubelet[1599]: I0513 08:37:59.928636 1599 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:37:59.929334 kubelet[1599]: E0513 08:37:59.929180 1599 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.24.4.14:6443/api/v1/nodes\": dial tcp 172.24.4.14:6443: connect: connection refused" node="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:00.069134 kubelet[1599]: W0513 08:38:00.069035 1599 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.24.4.14:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.14:6443: connect: connection refused May 13 08:38:00.069796 kubelet[1599]: E0513 08:38:00.069140 1599 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.24.4.14:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.24.4.14:6443: connect: connection refused" logger="UnhandledError" May 13 08:38:00.093412 kubelet[1599]: W0513 08:38:00.093208 1599 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.24.4.14:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-n-702ca96d1c.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.14:6443: connect: connection refused May 13 08:38:00.093412 kubelet[1599]: E0513 08:38:00.093343 1599 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.24.4.14:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-n-702ca96d1c.novalocal&limit=500&resourceVersion=0\": dial tcp 172.24.4.14:6443: connect: connection refused" logger="UnhandledError" May 13 08:38:00.202839 kubelet[1599]: W0513 08:38:00.201929 1599 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.24.4.14:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.24.4.14:6443: connect: connection refused May 13 08:38:00.202839 kubelet[1599]: E0513 08:38:00.202062 1599 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.24.4.14:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.24.4.14:6443: connect: connection refused" logger="UnhandledError" May 13 08:38:00.202742 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount292886897.mount: Deactivated successfully. May 13 08:38:00.213078 env[1160]: time="2025-05-13T08:38:00.212829098Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:00.219774 env[1160]: time="2025-05-13T08:38:00.219586713Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:00.223455 env[1160]: time="2025-05-13T08:38:00.223393101Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:00.226551 env[1160]: time="2025-05-13T08:38:00.226456462Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:00.228538 env[1160]: time="2025-05-13T08:38:00.228433885Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:00.230605 env[1160]: time="2025-05-13T08:38:00.230556667Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:00.238159 env[1160]: time="2025-05-13T08:38:00.238107507Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:00.246144 env[1160]: time="2025-05-13T08:38:00.246063947Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:00.249634 env[1160]: time="2025-05-13T08:38:00.249585909Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:00.254676 env[1160]: time="2025-05-13T08:38:00.254628756Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:00.256772 env[1160]: time="2025-05-13T08:38:00.256726209Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:00.260416 env[1160]: time="2025-05-13T08:38:00.260344997Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:00.263480 kubelet[1599]: W0513 08:38:00.263295 1599 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.24.4.14:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.14:6443: connect: connection refused May 13 08:38:00.263480 kubelet[1599]: E0513 08:38:00.263427 1599 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.24.4.14:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.24.4.14:6443: connect: connection refused" logger="UnhandledError" May 13 08:38:00.301316 env[1160]: time="2025-05-13T08:38:00.301148941Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 08:38:00.301540 env[1160]: time="2025-05-13T08:38:00.301500807Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 08:38:00.301636 env[1160]: time="2025-05-13T08:38:00.301612382Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 08:38:00.301934 env[1160]: time="2025-05-13T08:38:00.301907960Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9beffe09f78a081e019374a83b27b56b5b9a6865353496895ec603e8c1c8e88b pid=1638 runtime=io.containerd.runc.v2 May 13 08:38:00.319514 systemd[1]: Started cri-containerd-9beffe09f78a081e019374a83b27b56b5b9a6865353496895ec603e8c1c8e88b.scope. May 13 08:38:00.325350 env[1160]: time="2025-05-13T08:38:00.324078242Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 08:38:00.325350 env[1160]: time="2025-05-13T08:38:00.324116306Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 08:38:00.325350 env[1160]: time="2025-05-13T08:38:00.324148818Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 08:38:00.325350 env[1160]: time="2025-05-13T08:38:00.324283848Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/16c6ba46cf692d6acff920a4c02f0116dcc2fcf7e686991d60390efe36a2c980 pid=1675 runtime=io.containerd.runc.v2 May 13 08:38:00.330680 env[1160]: time="2025-05-13T08:38:00.330627837Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 08:38:00.330852 env[1160]: time="2025-05-13T08:38:00.330829976Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 08:38:00.330955 env[1160]: time="2025-05-13T08:38:00.330933475Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 08:38:00.331176 env[1160]: time="2025-05-13T08:38:00.331149680Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7505b412b9e0af2a84bbcc559c3913f9fb4ce973733546f47ef8abdf6571d3f3 pid=1662 runtime=io.containerd.runc.v2 May 13 08:38:00.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit: BPF prog-id=61 op=LOAD May 13 08:38:00.336000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1638 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962656666653039663738613038316530313933373461383362323762 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1638 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962656666653039663738613038316530313933373461383362323762 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit: BPF prog-id=62 op=LOAD May 13 08:38:00.336000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000356320 items=0 ppid=1638 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962656666653039663738613038316530313933373461383362323762 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit: BPF prog-id=63 op=LOAD May 13 08:38:00.336000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000356368 items=0 ppid=1638 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962656666653039663738613038316530313933373461383362323762 May 13 08:38:00.336000 audit: BPF prog-id=63 op=UNLOAD May 13 08:38:00.336000 audit: BPF prog-id=62 op=UNLOAD May 13 08:38:00.336000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.336000 audit: BPF prog-id=64 op=LOAD May 13 08:38:00.336000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000356778 items=0 ppid=1638 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962656666653039663738613038316530313933373461383362323762 May 13 08:38:00.358642 systemd[1]: Started cri-containerd-16c6ba46cf692d6acff920a4c02f0116dcc2fcf7e686991d60390efe36a2c980.scope. May 13 08:38:00.378383 env[1160]: time="2025-05-13T08:38:00.378345684Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal,Uid:c8b2f2a4c3569fe46c1fde8dca02174f,Namespace:kube-system,Attempt:0,} returns sandbox id \"9beffe09f78a081e019374a83b27b56b5b9a6865353496895ec603e8c1c8e88b\"" May 13 08:38:00.379763 systemd[1]: Started cri-containerd-7505b412b9e0af2a84bbcc559c3913f9fb4ce973733546f47ef8abdf6571d3f3.scope. May 13 08:38:00.388807 env[1160]: time="2025-05-13T08:38:00.388742748Z" level=info msg="CreateContainer within sandbox \"9beffe09f78a081e019374a83b27b56b5b9a6865353496895ec603e8c1c8e88b\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 13 08:38:00.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.395000 audit: BPF prog-id=65 op=LOAD May 13 08:38:00.396000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.396000 audit[1689]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1675 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136633662613436636636393264366163666639323061346330326630 May 13 08:38:00.396000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.396000 audit[1689]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=1675 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136633662613436636636393264366163666639323061346330326630 May 13 08:38:00.397000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.397000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.397000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.397000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.397000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.397000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.397000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.397000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.397000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.397000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.397000 audit: BPF prog-id=66 op=LOAD May 13 08:38:00.397000 audit[1689]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0000255e0 items=0 ppid=1675 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136633662613436636636393264366163666639323061346330326630 May 13 08:38:00.398000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.398000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.398000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.398000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.398000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.398000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.398000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.398000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.398000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.398000 audit: BPF prog-id=67 op=LOAD May 13 08:38:00.398000 audit[1689]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000025628 items=0 ppid=1675 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136633662613436636636393264366163666639323061346330326630 May 13 08:38:00.398000 audit: BPF prog-id=67 op=UNLOAD May 13 08:38:00.398000 audit: BPF prog-id=66 op=UNLOAD May 13 08:38:00.398000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.398000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.398000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.398000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.398000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.398000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.398000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.398000 audit[1689]: AVC avc: denied { perfmon } for pid=1689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.398000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.398000 audit[1689]: AVC avc: denied { bpf } for pid=1689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.398000 audit: BPF prog-id=68 op=LOAD May 13 08:38:00.398000 audit[1689]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000025a38 items=0 ppid=1675 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136633662613436636636393264366163666639323061346330326630 May 13 08:38:00.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit: BPF prog-id=69 op=LOAD May 13 08:38:00.409000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1662 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735303562343132623965306166326138346262636335353963333931 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1662 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735303562343132623965306166326138346262636335353963333931 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit: BPF prog-id=70 op=LOAD May 13 08:38:00.409000 audit[1701]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001aa6d0 items=0 ppid=1662 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735303562343132623965306166326138346262636335353963333931 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit: BPF prog-id=71 op=LOAD May 13 08:38:00.409000 audit[1701]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001aa718 items=0 ppid=1662 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735303562343132623965306166326138346262636335353963333931 May 13 08:38:00.409000 audit: BPF prog-id=71 op=UNLOAD May 13 08:38:00.409000 audit: BPF prog-id=70 op=UNLOAD May 13 08:38:00.409000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { perfmon } for pid=1701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit[1701]: AVC avc: denied { bpf } for pid=1701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.409000 audit: BPF prog-id=72 op=LOAD May 13 08:38:00.409000 audit[1701]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001aab28 items=0 ppid=1662 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735303562343132623965306166326138346262636335353963333931 May 13 08:38:00.425621 env[1160]: time="2025-05-13T08:38:00.425567088Z" level=info msg="CreateContainer within sandbox \"9beffe09f78a081e019374a83b27b56b5b9a6865353496895ec603e8c1c8e88b\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"f9b245f770daff370d22332cadf3f87da4eeffd4c2c88395706c9e107b5876ae\"" May 13 08:38:00.426258 env[1160]: time="2025-05-13T08:38:00.426236886Z" level=info msg="StartContainer for \"f9b245f770daff370d22332cadf3f87da4eeffd4c2c88395706c9e107b5876ae\"" May 13 08:38:00.428943 env[1160]: time="2025-05-13T08:38:00.428906680Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-7-n-702ca96d1c.novalocal,Uid:e0a42e4329d3a9cc72fcce5d44cfea19,Namespace:kube-system,Attempt:0,} returns sandbox id \"16c6ba46cf692d6acff920a4c02f0116dcc2fcf7e686991d60390efe36a2c980\"" May 13 08:38:00.437677 env[1160]: time="2025-05-13T08:38:00.437640244Z" level=info msg="CreateContainer within sandbox \"16c6ba46cf692d6acff920a4c02f0116dcc2fcf7e686991d60390efe36a2c980\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 13 08:38:00.453248 systemd[1]: Started cri-containerd-f9b245f770daff370d22332cadf3f87da4eeffd4c2c88395706c9e107b5876ae.scope. May 13 08:38:00.480617 env[1160]: time="2025-05-13T08:38:00.480569384Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-7-n-702ca96d1c.novalocal,Uid:6802707891943f284679eb48dc63d255,Namespace:kube-system,Attempt:0,} returns sandbox id \"7505b412b9e0af2a84bbcc559c3913f9fb4ce973733546f47ef8abdf6571d3f3\"" May 13 08:38:00.483183 env[1160]: time="2025-05-13T08:38:00.483153373Z" level=info msg="CreateContainer within sandbox \"7505b412b9e0af2a84bbcc559c3913f9fb4ce973733546f47ef8abdf6571d3f3\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 13 08:38:00.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit: BPF prog-id=73 op=LOAD May 13 08:38:00.486000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1638 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639623234356637373064616666333730643232333332636164663366 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1638 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639623234356637373064616666333730643232333332636164663366 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit: BPF prog-id=74 op=LOAD May 13 08:38:00.486000 audit[1755]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000228430 items=0 ppid=1638 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639623234356637373064616666333730643232333332636164663366 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit: BPF prog-id=75 op=LOAD May 13 08:38:00.486000 audit[1755]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000228478 items=0 ppid=1638 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639623234356637373064616666333730643232333332636164663366 May 13 08:38:00.486000 audit: BPF prog-id=75 op=UNLOAD May 13 08:38:00.486000 audit: BPF prog-id=74 op=UNLOAD May 13 08:38:00.486000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { perfmon } for pid=1755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit[1755]: AVC avc: denied { bpf } for pid=1755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.486000 audit: BPF prog-id=76 op=LOAD May 13 08:38:00.486000 audit[1755]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000228888 items=0 ppid=1638 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639623234356637373064616666333730643232333332636164663366 May 13 08:38:00.490263 env[1160]: time="2025-05-13T08:38:00.490231283Z" level=info msg="CreateContainer within sandbox \"16c6ba46cf692d6acff920a4c02f0116dcc2fcf7e686991d60390efe36a2c980\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"2885e90395a83ab3fcadcc98190706042d1b58b24a2fdc3362e2d2ebfb275e6d\"" May 13 08:38:00.491790 env[1160]: time="2025-05-13T08:38:00.491755884Z" level=info msg="StartContainer for \"2885e90395a83ab3fcadcc98190706042d1b58b24a2fdc3362e2d2ebfb275e6d\"" May 13 08:38:00.508382 env[1160]: time="2025-05-13T08:38:00.508339293Z" level=info msg="CreateContainer within sandbox \"7505b412b9e0af2a84bbcc559c3913f9fb4ce973733546f47ef8abdf6571d3f3\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"23d90366c4d3da28e18ccb40aba0362191c7e37750090ef38532707622d7f29b\"" May 13 08:38:00.509720 env[1160]: time="2025-05-13T08:38:00.509688728Z" level=info msg="StartContainer for \"23d90366c4d3da28e18ccb40aba0362191c7e37750090ef38532707622d7f29b\"" May 13 08:38:00.515920 systemd[1]: Started cri-containerd-2885e90395a83ab3fcadcc98190706042d1b58b24a2fdc3362e2d2ebfb275e6d.scope. May 13 08:38:00.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.536000 audit: BPF prog-id=77 op=LOAD May 13 08:38:00.537000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.537000 audit[1791]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1675 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238383565393033393561383361623366636164636339383139303730 May 13 08:38:00.537000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.537000 audit[1791]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1675 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238383565393033393561383361623366636164636339383139303730 May 13 08:38:00.538000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.538000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.538000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.538000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.538000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.538000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.538000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.538000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.538000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.538000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.538000 audit: BPF prog-id=78 op=LOAD May 13 08:38:00.538000 audit[1791]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000299040 items=0 ppid=1675 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238383565393033393561383361623366636164636339383139303730 May 13 08:38:00.538000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.538000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.538000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.538000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.538000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.538000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.538000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.538000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.538000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.538000 audit: BPF prog-id=79 op=LOAD May 13 08:38:00.538000 audit[1791]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000299088 items=0 ppid=1675 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238383565393033393561383361623366636164636339383139303730 May 13 08:38:00.539000 audit: BPF prog-id=79 op=UNLOAD May 13 08:38:00.539000 audit: BPF prog-id=78 op=UNLOAD May 13 08:38:00.539000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.539000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.539000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.539000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.539000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.539000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.539000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.539000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.539000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.539000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.539000 audit: BPF prog-id=80 op=LOAD May 13 08:38:00.539000 audit[1791]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000299498 items=0 ppid=1675 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238383565393033393561383361623366636164636339383139303730 May 13 08:38:00.545698 env[1160]: time="2025-05-13T08:38:00.545626724Z" level=info msg="StartContainer for \"f9b245f770daff370d22332cadf3f87da4eeffd4c2c88395706c9e107b5876ae\" returns successfully" May 13 08:38:00.561167 systemd[1]: Started cri-containerd-23d90366c4d3da28e18ccb40aba0362191c7e37750090ef38532707622d7f29b.scope. May 13 08:38:00.563790 kubelet[1599]: E0513 08:38:00.563645 1599 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-n-702ca96d1c.novalocal?timeout=10s\": dial tcp 172.24.4.14:6443: connect: connection refused" interval="1.6s" May 13 08:38:00.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.583000 audit: BPF prog-id=81 op=LOAD May 13 08:38:00.583000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.583000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1662 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643930333636633464336461323865313863636234306162613033 May 13 08:38:00.583000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.583000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1662 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643930333636633464336461323865313863636234306162613033 May 13 08:38:00.583000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.583000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.583000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.583000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.583000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.583000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.583000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.583000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.583000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.583000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.583000 audit: BPF prog-id=82 op=LOAD May 13 08:38:00.583000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003828d0 items=0 ppid=1662 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643930333636633464336461323865313863636234306162613033 May 13 08:38:00.583000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.583000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.583000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.583000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.583000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.583000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.583000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.583000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.583000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.583000 audit: BPF prog-id=83 op=LOAD May 13 08:38:00.583000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000382918 items=0 ppid=1662 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643930333636633464336461323865313863636234306162613033 May 13 08:38:00.583000 audit: BPF prog-id=83 op=UNLOAD May 13 08:38:00.583000 audit: BPF prog-id=82 op=UNLOAD May 13 08:38:00.584000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.584000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.584000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.584000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.584000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.584000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.584000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.584000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.584000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.584000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:00.584000 audit: BPF prog-id=84 op=LOAD May 13 08:38:00.584000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000382d28 items=0 ppid=1662 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:00.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643930333636633464336461323865313863636234306162613033 May 13 08:38:00.592563 env[1160]: time="2025-05-13T08:38:00.592522091Z" level=info msg="StartContainer for \"2885e90395a83ab3fcadcc98190706042d1b58b24a2fdc3362e2d2ebfb275e6d\" returns successfully" May 13 08:38:00.652382 env[1160]: time="2025-05-13T08:38:00.652327892Z" level=info msg="StartContainer for \"23d90366c4d3da28e18ccb40aba0362191c7e37750090ef38532707622d7f29b\" returns successfully" May 13 08:38:00.731029 kubelet[1599]: I0513 08:38:00.730723 1599 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:00.731136 kubelet[1599]: E0513 08:38:00.731032 1599 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.24.4.14:6443/api/v1/nodes\": dial tcp 172.24.4.14:6443: connect: connection refused" node="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:01.892000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:38:01.892000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b8d2c0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:38:01.892000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:38:01.899000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:38:01.899000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000cab0a0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:38:01.899000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:38:02.333276 kubelet[1599]: I0513 08:38:02.333251 1599 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:02.392231 kernel: kauditd_printk_skb: 711 callbacks suppressed May 13 08:38:02.392353 kernel: audit: type=1400 audit(1747125482.383:490): avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:38:02.383000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:38:02.383000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0012f1da0 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:38:02.383000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:38:02.412068 kernel: audit: type=1300 audit(1747125482.383:490): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0012f1da0 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:38:02.412112 kernel: audit: type=1327 audit(1747125482.383:490): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:38:02.383000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:38:02.425504 kernel: audit: type=1400 audit(1747125482.383:491): avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:38:02.383000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0066b3be0 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:38:02.383000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:38:02.447124 kernel: audit: type=1300 audit(1747125482.383:491): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0066b3be0 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:38:02.447171 kernel: audit: type=1327 audit(1747125482.383:491): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:38:02.383000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7295 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:38:02.383000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0012f1ef0 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:38:02.461447 kernel: audit: type=1400 audit(1747125482.383:492): avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7295 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:38:02.461505 kernel: audit: type=1300 audit(1747125482.383:492): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0012f1ef0 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:38:02.383000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:38:02.469499 kernel: audit: type=1327 audit(1747125482.383:492): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:38:02.469549 kernel: audit: type=1400 audit(1747125482.394:493): avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7301 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:38:02.394000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7301 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:38:02.394000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c007cde840 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:38:02.394000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:38:02.468000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:38:02.468000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c001469be0 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:38:02.468000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:38:02.468000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:38:02.468000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0069aede0 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:38:02.468000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:38:02.544432 kubelet[1599]: E0513 08:38:02.544405 1599 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-7-n-702ca96d1c.novalocal\" not found" node="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:02.625930 kubelet[1599]: I0513 08:38:02.625827 1599 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:03.102775 kubelet[1599]: I0513 08:38:03.102751 1599 apiserver.go:52] "Watching apiserver" May 13 08:38:03.151267 kubelet[1599]: I0513 08:38:03.151244 1599 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 13 08:38:03.697553 kubelet[1599]: W0513 08:38:03.697457 1599 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 13 08:38:04.485170 kubelet[1599]: W0513 08:38:04.485083 1599 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 13 08:38:05.430202 systemd[1]: Reloading. May 13 08:38:05.536543 kubelet[1599]: W0513 08:38:05.535401 1599 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 13 08:38:05.612279 /usr/lib/systemd/system-generators/torcx-generator[1889]: time="2025-05-13T08:38:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 08:38:05.613995 /usr/lib/systemd/system-generators/torcx-generator[1889]: time="2025-05-13T08:38:05Z" level=info msg="torcx already run" May 13 08:38:05.698626 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 08:38:05.698643 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 08:38:05.722816 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 08:38:05.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.815000 audit: BPF prog-id=85 op=LOAD May 13 08:38:05.815000 audit: BPF prog-id=46 op=UNLOAD May 13 08:38:05.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit: BPF prog-id=86 op=LOAD May 13 08:38:05.816000 audit: BPF prog-id=47 op=UNLOAD May 13 08:38:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit: BPF prog-id=87 op=LOAD May 13 08:38:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit: BPF prog-id=88 op=LOAD May 13 08:38:05.816000 audit: BPF prog-id=48 op=UNLOAD May 13 08:38:05.816000 audit: BPF prog-id=49 op=UNLOAD May 13 08:38:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.816000 audit: BPF prog-id=89 op=LOAD May 13 08:38:05.816000 audit: BPF prog-id=81 op=UNLOAD May 13 08:38:05.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit: BPF prog-id=90 op=LOAD May 13 08:38:05.818000 audit: BPF prog-id=50 op=UNLOAD May 13 08:38:05.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit: BPF prog-id=91 op=LOAD May 13 08:38:05.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.818000 audit: BPF prog-id=92 op=LOAD May 13 08:38:05.818000 audit: BPF prog-id=51 op=UNLOAD May 13 08:38:05.818000 audit: BPF prog-id=52 op=UNLOAD May 13 08:38:05.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.819000 audit: BPF prog-id=93 op=LOAD May 13 08:38:05.819000 audit: BPF prog-id=65 op=UNLOAD May 13 08:38:05.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.822000 audit: BPF prog-id=94 op=LOAD May 13 08:38:05.822000 audit: BPF prog-id=53 op=UNLOAD May 13 08:38:05.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit: BPF prog-id=95 op=LOAD May 13 08:38:05.824000 audit: BPF prog-id=54 op=UNLOAD May 13 08:38:05.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit: BPF prog-id=96 op=LOAD May 13 08:38:05.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.824000 audit: BPF prog-id=97 op=LOAD May 13 08:38:05.824000 audit: BPF prog-id=55 op=UNLOAD May 13 08:38:05.824000 audit: BPF prog-id=56 op=UNLOAD May 13 08:38:05.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.825000 audit: BPF prog-id=98 op=LOAD May 13 08:38:05.825000 audit: BPF prog-id=77 op=UNLOAD May 13 08:38:05.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.825000 audit: BPF prog-id=99 op=LOAD May 13 08:38:05.825000 audit: BPF prog-id=73 op=UNLOAD May 13 08:38:05.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.826000 audit: BPF prog-id=100 op=LOAD May 13 08:38:05.826000 audit: BPF prog-id=69 op=UNLOAD May 13 08:38:05.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.827000 audit: BPF prog-id=101 op=LOAD May 13 08:38:05.827000 audit: BPF prog-id=57 op=UNLOAD May 13 08:38:05.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.828000 audit: BPF prog-id=102 op=LOAD May 13 08:38:05.828000 audit: BPF prog-id=58 op=UNLOAD May 13 08:38:05.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.828000 audit: BPF prog-id=103 op=LOAD May 13 08:38:05.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.828000 audit: BPF prog-id=104 op=LOAD May 13 08:38:05.828000 audit: BPF prog-id=59 op=UNLOAD May 13 08:38:05.828000 audit: BPF prog-id=60 op=UNLOAD May 13 08:38:05.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:05.829000 audit: BPF prog-id=105 op=LOAD May 13 08:38:05.829000 audit: BPF prog-id=61 op=UNLOAD May 13 08:38:05.859893 systemd[1]: Stopping kubelet.service... May 13 08:38:05.886997 systemd[1]: kubelet.service: Deactivated successfully. May 13 08:38:05.887277 systemd[1]: Stopped kubelet.service. May 13 08:38:05.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:38:05.887555 systemd[1]: kubelet.service: Consumed 1.188s CPU time. May 13 08:38:05.889930 systemd[1]: Starting kubelet.service... May 13 08:38:06.040564 systemd[1]: Started kubelet.service. May 13 08:38:06.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:38:06.275698 kubelet[1940]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 08:38:06.275698 kubelet[1940]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 13 08:38:06.275698 kubelet[1940]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 08:38:06.276056 kubelet[1940]: I0513 08:38:06.275809 1940 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 08:38:06.290511 kubelet[1940]: I0513 08:38:06.290428 1940 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 13 08:38:06.290511 kubelet[1940]: I0513 08:38:06.290461 1940 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 08:38:06.290810 kubelet[1940]: I0513 08:38:06.290746 1940 server.go:929] "Client rotation is on, will bootstrap in background" May 13 08:38:06.292512 kubelet[1940]: I0513 08:38:06.292472 1940 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 13 08:38:06.294736 kubelet[1940]: I0513 08:38:06.294707 1940 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 08:38:06.299478 kubelet[1940]: E0513 08:38:06.299429 1940 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 13 08:38:06.299478 kubelet[1940]: I0513 08:38:06.299467 1940 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 13 08:38:06.302395 kubelet[1940]: I0513 08:38:06.302366 1940 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 08:38:06.302553 kubelet[1940]: I0513 08:38:06.302507 1940 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 13 08:38:06.302642 kubelet[1940]: I0513 08:38:06.302600 1940 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 08:38:06.302811 kubelet[1940]: I0513 08:38:06.302633 1940 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-7-n-702ca96d1c.novalocal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 13 08:38:06.302936 kubelet[1940]: I0513 08:38:06.302823 1940 topology_manager.go:138] "Creating topology manager with none policy" May 13 08:38:06.302936 kubelet[1940]: I0513 08:38:06.302836 1940 container_manager_linux.go:300] "Creating device plugin manager" May 13 08:38:06.302936 kubelet[1940]: I0513 08:38:06.302878 1940 state_mem.go:36] "Initialized new in-memory state store" May 13 08:38:06.303031 kubelet[1940]: I0513 08:38:06.303018 1940 kubelet.go:408] "Attempting to sync node with API server" May 13 08:38:06.303071 kubelet[1940]: I0513 08:38:06.303032 1940 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 08:38:06.303554 kubelet[1940]: I0513 08:38:06.303536 1940 kubelet.go:314] "Adding apiserver pod source" May 13 08:38:06.303620 kubelet[1940]: I0513 08:38:06.303566 1940 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 08:38:06.314000 audit[1940]: AVC avc: denied { mac_admin } for pid=1940 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:06.314000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 08:38:06.314000 audit[1940]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c19a10 a1=c000c0cfc0 a2=c000c199e0 a3=25 items=0 ppid=1 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:06.314000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 08:38:06.314000 audit[1940]: AVC avc: denied { mac_admin } for pid=1940 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:06.314000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 08:38:06.314000 audit[1940]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c1b2a0 a1=c000c0cfd8 a2=c000c19aa0 a3=25 items=0 ppid=1 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:06.314000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 08:38:06.316940 kubelet[1940]: I0513 08:38:06.310638 1940 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 08:38:06.316940 kubelet[1940]: I0513 08:38:06.311138 1940 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 08:38:06.316940 kubelet[1940]: I0513 08:38:06.311613 1940 server.go:1269] "Started kubelet" May 13 08:38:06.316940 kubelet[1940]: I0513 08:38:06.315036 1940 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 13 08:38:06.316940 kubelet[1940]: I0513 08:38:06.315090 1940 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 13 08:38:06.316940 kubelet[1940]: I0513 08:38:06.315154 1940 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 08:38:06.329515 kubelet[1940]: I0513 08:38:06.328207 1940 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 13 08:38:06.329515 kubelet[1940]: I0513 08:38:06.329132 1940 server.go:460] "Adding debug handlers to kubelet server" May 13 08:38:06.330237 kubelet[1940]: I0513 08:38:06.330175 1940 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 08:38:06.330386 kubelet[1940]: I0513 08:38:06.330363 1940 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 08:38:06.330618 kubelet[1940]: I0513 08:38:06.330595 1940 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 13 08:38:06.338278 kubelet[1940]: I0513 08:38:06.338236 1940 volume_manager.go:289] "Starting Kubelet Volume Manager" May 13 08:38:06.338649 kubelet[1940]: E0513 08:38:06.338623 1940 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510-3-7-n-702ca96d1c.novalocal\" not found" May 13 08:38:06.343944 kubelet[1940]: I0513 08:38:06.343921 1940 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 13 08:38:06.344074 kubelet[1940]: I0513 08:38:06.344055 1940 reconciler.go:26] "Reconciler: start to sync state" May 13 08:38:06.349278 kubelet[1940]: I0513 08:38:06.349247 1940 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 08:38:06.349993 kubelet[1940]: I0513 08:38:06.349975 1940 factory.go:221] Registration of the systemd container factory successfully May 13 08:38:06.350078 kubelet[1940]: I0513 08:38:06.350058 1940 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 08:38:06.351801 kubelet[1940]: E0513 08:38:06.351782 1940 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 08:38:06.352161 kubelet[1940]: I0513 08:38:06.352139 1940 factory.go:221] Registration of the containerd container factory successfully May 13 08:38:06.357210 kubelet[1940]: I0513 08:38:06.357176 1940 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 08:38:06.357333 kubelet[1940]: I0513 08:38:06.357231 1940 status_manager.go:217] "Starting to sync pod status with apiserver" May 13 08:38:06.357333 kubelet[1940]: I0513 08:38:06.357257 1940 kubelet.go:2321] "Starting kubelet main sync loop" May 13 08:38:06.357333 kubelet[1940]: E0513 08:38:06.357295 1940 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 13 08:38:06.413623 kubelet[1940]: I0513 08:38:06.413601 1940 cpu_manager.go:214] "Starting CPU manager" policy="none" May 13 08:38:06.413771 kubelet[1940]: I0513 08:38:06.413760 1940 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 13 08:38:06.413903 kubelet[1940]: I0513 08:38:06.413894 1940 state_mem.go:36] "Initialized new in-memory state store" May 13 08:38:06.414109 kubelet[1940]: I0513 08:38:06.414096 1940 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 13 08:38:06.414192 kubelet[1940]: I0513 08:38:06.414168 1940 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 13 08:38:06.414251 kubelet[1940]: I0513 08:38:06.414243 1940 policy_none.go:49] "None policy: Start" May 13 08:38:06.415818 kubelet[1940]: I0513 08:38:06.415797 1940 memory_manager.go:170] "Starting memorymanager" policy="None" May 13 08:38:06.415929 kubelet[1940]: I0513 08:38:06.415919 1940 state_mem.go:35] "Initializing new in-memory state store" May 13 08:38:06.416164 kubelet[1940]: I0513 08:38:06.416151 1940 state_mem.go:75] "Updated machine memory state" May 13 08:38:06.420990 kubelet[1940]: I0513 08:38:06.420972 1940 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 08:38:06.420000 audit[1940]: AVC avc: denied { mac_admin } for pid=1940 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:06.420000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 08:38:06.420000 audit[1940]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008ea660 a1=c000c0c180 a2=c0008ea630 a3=25 items=0 ppid=1 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:06.420000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 08:38:06.421435 kubelet[1940]: I0513 08:38:06.421420 1940 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 13 08:38:06.421657 kubelet[1940]: I0513 08:38:06.421644 1940 eviction_manager.go:189] "Eviction manager: starting control loop" May 13 08:38:06.421773 kubelet[1940]: I0513 08:38:06.421739 1940 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 08:38:06.422871 kubelet[1940]: I0513 08:38:06.422847 1940 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 08:38:06.465666 kubelet[1940]: W0513 08:38:06.465623 1940 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 13 08:38:06.465815 kubelet[1940]: E0513 08:38:06.465719 1940 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-7-n-702ca96d1c.novalocal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:06.473622 kubelet[1940]: W0513 08:38:06.473602 1940 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 13 08:38:06.473811 kubelet[1940]: E0513 08:38:06.473784 1940 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510-3-7-n-702ca96d1c.novalocal\" already exists" pod="kube-system/kube-scheduler-ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:06.475360 kubelet[1940]: W0513 08:38:06.475343 1940 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 13 08:38:06.475530 kubelet[1940]: E0513 08:38:06.475516 1940 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal\" already exists" pod="kube-system/kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:06.525254 kubelet[1940]: I0513 08:38:06.525167 1940 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:06.535049 kubelet[1940]: I0513 08:38:06.535018 1940 kubelet_node_status.go:111] "Node was previously registered" node="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:06.535178 kubelet[1940]: I0513 08:38:06.535104 1940 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:06.544602 kubelet[1940]: I0513 08:38:06.544517 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e0a42e4329d3a9cc72fcce5d44cfea19-ca-certs\") pod \"kube-apiserver-ci-3510-3-7-n-702ca96d1c.novalocal\" (UID: \"e0a42e4329d3a9cc72fcce5d44cfea19\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:06.645329 kubelet[1940]: I0513 08:38:06.645253 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c8b2f2a4c3569fe46c1fde8dca02174f-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal\" (UID: \"c8b2f2a4c3569fe46c1fde8dca02174f\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:06.645679 kubelet[1940]: I0513 08:38:06.645634 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c8b2f2a4c3569fe46c1fde8dca02174f-ca-certs\") pod \"kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal\" (UID: \"c8b2f2a4c3569fe46c1fde8dca02174f\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:06.645804 kubelet[1940]: I0513 08:38:06.645787 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/c8b2f2a4c3569fe46c1fde8dca02174f-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal\" (UID: \"c8b2f2a4c3569fe46c1fde8dca02174f\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:06.645920 kubelet[1940]: I0513 08:38:06.645905 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c8b2f2a4c3569fe46c1fde8dca02174f-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal\" (UID: \"c8b2f2a4c3569fe46c1fde8dca02174f\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:06.646032 kubelet[1940]: I0513 08:38:06.646015 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c8b2f2a4c3569fe46c1fde8dca02174f-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal\" (UID: \"c8b2f2a4c3569fe46c1fde8dca02174f\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:06.646148 kubelet[1940]: I0513 08:38:06.646133 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6802707891943f284679eb48dc63d255-kubeconfig\") pod \"kube-scheduler-ci-3510-3-7-n-702ca96d1c.novalocal\" (UID: \"6802707891943f284679eb48dc63d255\") " pod="kube-system/kube-scheduler-ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:06.646276 kubelet[1940]: I0513 08:38:06.646262 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e0a42e4329d3a9cc72fcce5d44cfea19-k8s-certs\") pod \"kube-apiserver-ci-3510-3-7-n-702ca96d1c.novalocal\" (UID: \"e0a42e4329d3a9cc72fcce5d44cfea19\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:06.646384 kubelet[1940]: I0513 08:38:06.646368 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e0a42e4329d3a9cc72fcce5d44cfea19-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-7-n-702ca96d1c.novalocal\" (UID: \"e0a42e4329d3a9cc72fcce5d44cfea19\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:07.307466 kubelet[1940]: I0513 08:38:07.307419 1940 apiserver.go:52] "Watching apiserver" May 13 08:38:07.344230 kubelet[1940]: I0513 08:38:07.344184 1940 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 13 08:38:07.400380 kubelet[1940]: W0513 08:38:07.400301 1940 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 13 08:38:07.400380 kubelet[1940]: E0513 08:38:07.400367 1940 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-7-n-702ca96d1c.novalocal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:07.416975 kubelet[1940]: I0513 08:38:07.416854 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-7-n-702ca96d1c.novalocal" podStartSLOduration=2.416814997 podStartE2EDuration="2.416814997s" podCreationTimestamp="2025-05-13 08:38:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 08:38:07.415036659 +0000 UTC m=+1.368156460" watchObservedRunningTime="2025-05-13 08:38:07.416814997 +0000 UTC m=+1.369934728" May 13 08:38:07.430270 kubelet[1940]: I0513 08:38:07.430184 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-7-n-702ca96d1c.novalocal" podStartSLOduration=3.430152725 podStartE2EDuration="3.430152725s" podCreationTimestamp="2025-05-13 08:38:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 08:38:07.428699676 +0000 UTC m=+1.381819468" watchObservedRunningTime="2025-05-13 08:38:07.430152725 +0000 UTC m=+1.383272457" May 13 08:38:07.461115 kubelet[1940]: I0513 08:38:07.460977 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-7-n-702ca96d1c.novalocal" podStartSLOduration=4.460943342 podStartE2EDuration="4.460943342s" podCreationTimestamp="2025-05-13 08:38:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 08:38:07.443933057 +0000 UTC m=+1.397052798" watchObservedRunningTime="2025-05-13 08:38:07.460943342 +0000 UTC m=+1.414063074" May 13 08:38:08.536335 kernel: kauditd_printk_skb: 266 callbacks suppressed May 13 08:38:08.536458 kernel: audit: type=1400 audit(1747125488.528:745): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:38:08.528000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:38:08.528000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0015ee9a0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:38:08.528000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:38:08.552078 kernel: audit: type=1300 audit(1747125488.528:745): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0015ee9a0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:38:08.552149 kernel: audit: type=1327 audit(1747125488.528:745): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:38:08.536000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:38:08.558198 kernel: audit: type=1400 audit(1747125488.536:746): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:38:08.536000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0015eeb60 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:38:08.566322 kernel: audit: type=1300 audit(1747125488.536:746): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0015eeb60 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:38:08.536000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:38:08.573044 kernel: audit: type=1327 audit(1747125488.536:746): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:38:08.573137 kernel: audit: type=1400 audit(1747125488.542:747): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:38:08.542000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:38:08.542000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0015eed20 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:38:08.587500 kernel: audit: type=1300 audit(1747125488.542:747): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0015eed20 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:38:08.542000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:38:08.594335 kernel: audit: type=1327 audit(1747125488.542:747): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:38:08.543000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:38:08.600299 kernel: audit: type=1400 audit(1747125488.543:748): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:38:08.543000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0016948e0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:38:08.543000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:38:08.706000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 13 08:38:08.706000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000aac800 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:38:08.706000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:38:10.584815 kubelet[1940]: I0513 08:38:10.584789 1940 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 13 08:38:10.585563 env[1160]: time="2025-05-13T08:38:10.585535312Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 13 08:38:10.585995 kubelet[1940]: I0513 08:38:10.585980 1940 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 13 08:38:11.533632 systemd[1]: Created slice kubepods-besteffort-podd73ae3b8_b994_4130_9bf1_430a0890d5f3.slice. May 13 08:38:11.585386 kubelet[1940]: I0513 08:38:11.585343 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d73ae3b8-b994-4130-9bf1-430a0890d5f3-lib-modules\") pod \"kube-proxy-6gf8m\" (UID: \"d73ae3b8-b994-4130-9bf1-430a0890d5f3\") " pod="kube-system/kube-proxy-6gf8m" May 13 08:38:11.585885 kubelet[1940]: I0513 08:38:11.585846 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xghjw\" (UniqueName: \"kubernetes.io/projected/d73ae3b8-b994-4130-9bf1-430a0890d5f3-kube-api-access-xghjw\") pod \"kube-proxy-6gf8m\" (UID: \"d73ae3b8-b994-4130-9bf1-430a0890d5f3\") " pod="kube-system/kube-proxy-6gf8m" May 13 08:38:11.586060 kubelet[1940]: I0513 08:38:11.585988 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/d73ae3b8-b994-4130-9bf1-430a0890d5f3-kube-proxy\") pod \"kube-proxy-6gf8m\" (UID: \"d73ae3b8-b994-4130-9bf1-430a0890d5f3\") " pod="kube-system/kube-proxy-6gf8m" May 13 08:38:11.586181 kubelet[1940]: I0513 08:38:11.586166 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d73ae3b8-b994-4130-9bf1-430a0890d5f3-xtables-lock\") pod \"kube-proxy-6gf8m\" (UID: \"d73ae3b8-b994-4130-9bf1-430a0890d5f3\") " pod="kube-system/kube-proxy-6gf8m" May 13 08:38:11.703783 kubelet[1940]: I0513 08:38:11.703733 1940 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 13 08:38:11.777172 systemd[1]: Created slice kubepods-besteffort-pod48c8cedd_0996_4b72_8a54_32181ea171aa.slice. May 13 08:38:11.788040 kubelet[1940]: I0513 08:38:11.787939 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/48c8cedd-0996-4b72-8a54-32181ea171aa-var-lib-calico\") pod \"tigera-operator-6f6897fdc5-5rq8p\" (UID: \"48c8cedd-0996-4b72-8a54-32181ea171aa\") " pod="tigera-operator/tigera-operator-6f6897fdc5-5rq8p" May 13 08:38:11.788297 kubelet[1940]: I0513 08:38:11.788267 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-49jx6\" (UniqueName: \"kubernetes.io/projected/48c8cedd-0996-4b72-8a54-32181ea171aa-kube-api-access-49jx6\") pod \"tigera-operator-6f6897fdc5-5rq8p\" (UID: \"48c8cedd-0996-4b72-8a54-32181ea171aa\") " pod="tigera-operator/tigera-operator-6f6897fdc5-5rq8p" May 13 08:38:11.844428 env[1160]: time="2025-05-13T08:38:11.844322309Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6gf8m,Uid:d73ae3b8-b994-4130-9bf1-430a0890d5f3,Namespace:kube-system,Attempt:0,}" May 13 08:38:11.893675 env[1160]: time="2025-05-13T08:38:11.892786864Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 08:38:11.893675 env[1160]: time="2025-05-13T08:38:11.892908666Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 08:38:11.893675 env[1160]: time="2025-05-13T08:38:11.892957468Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 08:38:11.903204 env[1160]: time="2025-05-13T08:38:11.902109647Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e4a8e254c09e6c32459082a8641c619dba9815a068cea35f5b42c69169518baa pid=2006 runtime=io.containerd.runc.v2 May 13 08:38:11.950197 systemd[1]: Started cri-containerd-e4a8e254c09e6c32459082a8641c619dba9815a068cea35f5b42c69169518baa.scope. May 13 08:38:11.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.972000 audit: BPF prog-id=106 op=LOAD May 13 08:38:11.973000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2006 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:11.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534613865323534633039653663333234353930383261383634316336 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2006 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:11.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534613865323534633039653663333234353930383261383634316336 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit: BPF prog-id=107 op=LOAD May 13 08:38:11.973000 audit[2016]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003100d0 items=0 ppid=2006 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:11.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534613865323534633039653663333234353930383261383634316336 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit: BPF prog-id=108 op=LOAD May 13 08:38:11.973000 audit[2016]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000310118 items=0 ppid=2006 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:11.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534613865323534633039653663333234353930383261383634316336 May 13 08:38:11.973000 audit: BPF prog-id=108 op=UNLOAD May 13 08:38:11.973000 audit: BPF prog-id=107 op=UNLOAD May 13 08:38:11.973000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:11.973000 audit: BPF prog-id=109 op=LOAD May 13 08:38:11.973000 audit[2016]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000310528 items=0 ppid=2006 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:11.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534613865323534633039653663333234353930383261383634316336 May 13 08:38:11.996194 env[1160]: time="2025-05-13T08:38:11.996154932Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6gf8m,Uid:d73ae3b8-b994-4130-9bf1-430a0890d5f3,Namespace:kube-system,Attempt:0,} returns sandbox id \"e4a8e254c09e6c32459082a8641c619dba9815a068cea35f5b42c69169518baa\"" May 13 08:38:12.002511 env[1160]: time="2025-05-13T08:38:12.000868732Z" level=info msg="CreateContainer within sandbox \"e4a8e254c09e6c32459082a8641c619dba9815a068cea35f5b42c69169518baa\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 13 08:38:12.028636 env[1160]: time="2025-05-13T08:38:12.028581373Z" level=info msg="CreateContainer within sandbox \"e4a8e254c09e6c32459082a8641c619dba9815a068cea35f5b42c69169518baa\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"b66272b1569623a61b710f902982c4eb7df37ed90a42dd853ea1e383c80b4430\"" May 13 08:38:12.031174 env[1160]: time="2025-05-13T08:38:12.031135349Z" level=info msg="StartContainer for \"b66272b1569623a61b710f902982c4eb7df37ed90a42dd853ea1e383c80b4430\"" May 13 08:38:12.058279 systemd[1]: Started cri-containerd-b66272b1569623a61b710f902982c4eb7df37ed90a42dd853ea1e383c80b4430.scope. May 13 08:38:12.081771 env[1160]: time="2025-05-13T08:38:12.081729394Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-5rq8p,Uid:48c8cedd-0996-4b72-8a54-32181ea171aa,Namespace:tigera-operator,Attempt:0,}" May 13 08:38:12.098000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fa120e1ccb8 items=0 ppid=2006 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236363237326231353639363233613631623731306639303239383263 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit: BPF prog-id=110 op=LOAD May 13 08:38:12.098000 audit[2051]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b4bf8 items=0 ppid=2006 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236363237326231353639363233613631623731306639303239383263 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit: BPF prog-id=111 op=LOAD May 13 08:38:12.098000 audit[2051]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b4c48 items=0 ppid=2006 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236363237326231353639363233613631623731306639303239383263 May 13 08:38:12.098000 audit: BPF prog-id=111 op=UNLOAD May 13 08:38:12.098000 audit: BPF prog-id=110 op=UNLOAD May 13 08:38:12.098000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.098000 audit: BPF prog-id=112 op=LOAD May 13 08:38:12.098000 audit[2051]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b4cd8 items=0 ppid=2006 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236363237326231353639363233613631623731306639303239383263 May 13 08:38:12.113898 env[1160]: time="2025-05-13T08:38:12.113340081Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 08:38:12.113898 env[1160]: time="2025-05-13T08:38:12.113371891Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 08:38:12.113898 env[1160]: time="2025-05-13T08:38:12.113384305Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 08:38:12.113898 env[1160]: time="2025-05-13T08:38:12.113569126Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5ea41f6c411cf40da01dae03948b2b890be68c402de891330c4103f63cf80a47 pid=2079 runtime=io.containerd.runc.v2 May 13 08:38:12.132682 systemd[1]: Started cri-containerd-5ea41f6c411cf40da01dae03948b2b890be68c402de891330c4103f63cf80a47.scope. May 13 08:38:12.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.161000 audit: BPF prog-id=113 op=LOAD May 13 08:38:12.162000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2079 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565613431663663343131636634306461303164616530333934386232 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2079 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565613431663663343131636634306461303164616530333934386232 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit: BPF prog-id=114 op=LOAD May 13 08:38:12.162000 audit[2087]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000347b70 items=0 ppid=2079 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565613431663663343131636634306461303164616530333934386232 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit: BPF prog-id=115 op=LOAD May 13 08:38:12.162000 audit[2087]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000347bb8 items=0 ppid=2079 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565613431663663343131636634306461303164616530333934386232 May 13 08:38:12.162000 audit: BPF prog-id=115 op=UNLOAD May 13 08:38:12.162000 audit: BPF prog-id=114 op=UNLOAD May 13 08:38:12.162000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:12.162000 audit: BPF prog-id=116 op=LOAD May 13 08:38:12.162000 audit[2087]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000347fc8 items=0 ppid=2079 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565613431663663343131636634306461303164616530333934386232 May 13 08:38:12.163000 audit[1334]: USER_END pid=1334 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 08:38:12.163000 audit[1334]: CRED_DISP pid=1334 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 08:38:12.164242 sudo[1334]: pam_unix(sudo:session): session closed for user root May 13 08:38:12.166617 env[1160]: time="2025-05-13T08:38:12.166531395Z" level=info msg="StartContainer for \"b66272b1569623a61b710f902982c4eb7df37ed90a42dd853ea1e383c80b4430\" returns successfully" May 13 08:38:12.196369 env[1160]: time="2025-05-13T08:38:12.196330905Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-5rq8p,Uid:48c8cedd-0996-4b72-8a54-32181ea171aa,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"5ea41f6c411cf40da01dae03948b2b890be68c402de891330c4103f63cf80a47\"" May 13 08:38:12.204372 env[1160]: time="2025-05-13T08:38:12.204336364Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 13 08:38:12.289000 audit[2162]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2162 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.289000 audit[2162]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffecb6b9390 a2=0 a3=7ffecb6b937c items=0 ppid=2066 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 08:38:12.291000 audit[2163]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:38:12.291000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd548fcc80 a2=0 a3=7ffd548fcc6c items=0 ppid=2066 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.291000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 08:38:12.292000 audit[2164]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2164 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.292000 audit[2164]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe58371ea0 a2=0 a3=7ffe58371e8c items=0 ppid=2066 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.293000 audit[2165]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2165 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:38:12.293000 audit[2165]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd53bb25f0 a2=0 a3=7ffd53bb25dc items=0 ppid=2066 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.293000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 08:38:12.292000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 08:38:12.294000 audit[2166]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:38:12.294000 audit[2166]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd936dedd0 a2=0 a3=7ffd936dedbc items=0 ppid=2066 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.294000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 08:38:12.295000 audit[2167]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.295000 audit[2167]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1a8bd7b0 a2=0 a3=7ffc1a8bd79c items=0 ppid=2066 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.295000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 08:38:12.343577 sshd[1330]: pam_unix(sshd:session): session closed for user core May 13 08:38:12.345000 audit[1330]: USER_END pid=1330 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:38:12.345000 audit[1330]: CRED_DISP pid=1330 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:38:12.347243 systemd[1]: sshd@8-172.24.4.14:22-172.24.4.1:42668.service: Deactivated successfully. May 13 08:38:12.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.14:22-172.24.4.1:42668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:38:12.348969 systemd[1]: session-9.scope: Deactivated successfully. May 13 08:38:12.349291 systemd[1]: session-9.scope: Consumed 6.558s CPU time. May 13 08:38:12.350212 systemd-logind[1147]: Session 9 logged out. Waiting for processes to exit. May 13 08:38:12.351547 systemd-logind[1147]: Removed session 9. May 13 08:38:12.388000 audit[2169]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:38:12.388000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffb84bb130 a2=0 a3=7fffb84bb11c items=0 ppid=2066 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.388000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 08:38:12.399000 audit[2171]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2171 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:38:12.399000 audit[2171]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffffea808f0 a2=0 a3=7ffffea808dc items=0 ppid=2066 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.399000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 13 08:38:12.429607 kubelet[1940]: I0513 08:38:12.429438 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-6gf8m" podStartSLOduration=1.429407836 podStartE2EDuration="1.429407836s" podCreationTimestamp="2025-05-13 08:38:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 08:38:12.42742824 +0000 UTC m=+6.380547991" watchObservedRunningTime="2025-05-13 08:38:12.429407836 +0000 UTC m=+6.382527568" May 13 08:38:12.429000 audit[2174]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2174 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:38:12.429000 audit[2174]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd06ba44c0 a2=0 a3=7ffd06ba44ac items=0 ppid=2066 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.429000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 13 08:38:12.437000 audit[2175]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:38:12.437000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6a01f7e0 a2=0 a3=7fff6a01f7cc items=0 ppid=2066 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.437000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 08:38:12.445000 audit[2177]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2177 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:38:12.445000 audit[2177]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc870e2d90 a2=0 a3=7ffc870e2d7c items=0 ppid=2066 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.445000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 08:38:12.448000 audit[2178]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:38:12.448000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5169af40 a2=0 a3=7ffd5169af2c items=0 ppid=2066 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.448000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 08:38:12.454000 audit[2180]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:38:12.454000 audit[2180]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdb6f2b310 a2=0 a3=7ffdb6f2b2fc items=0 ppid=2066 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 08:38:12.463000 audit[2183]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:38:12.463000 audit[2183]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd1e582890 a2=0 a3=7ffd1e58287c items=0 ppid=2066 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.463000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 13 08:38:12.465000 audit[2184]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:38:12.465000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc88d01b90 a2=0 a3=7ffc88d01b7c items=0 ppid=2066 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.465000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 08:38:12.470000 audit[2186]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:38:12.470000 audit[2186]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc77df1200 a2=0 a3=7ffc77df11ec items=0 ppid=2066 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.470000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 08:38:12.472000 audit[2187]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:38:12.472000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffebc041240 a2=0 a3=7ffebc04122c items=0 ppid=2066 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.472000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 08:38:12.475000 audit[2189]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2189 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:38:12.475000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc1e7a43e0 a2=0 a3=7ffc1e7a43cc items=0 ppid=2066 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.475000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 08:38:12.485000 audit[2192]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:38:12.485000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe0d2c50b0 a2=0 a3=7ffe0d2c509c items=0 ppid=2066 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.485000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 08:38:12.494000 audit[2195]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:38:12.494000 audit[2195]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffa0a44c80 a2=0 a3=7fffa0a44c6c items=0 ppid=2066 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.494000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 08:38:12.495000 audit[2196]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:38:12.495000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffd6272820 a2=0 a3=7fffd627280c items=0 ppid=2066 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.495000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 08:38:12.498000 audit[2198]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:38:12.498000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc77b8de70 a2=0 a3=7ffc77b8de5c items=0 ppid=2066 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.498000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 08:38:12.501000 audit[2201]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:38:12.501000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc870425b0 a2=0 a3=7ffc8704259c items=0 ppid=2066 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.501000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 08:38:12.502000 audit[2202]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:38:12.502000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeba75b140 a2=0 a3=7ffeba75b12c items=0 ppid=2066 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.502000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 08:38:12.505000 audit[2204]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:38:12.505000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffc5ff4e9c0 a2=0 a3=7ffc5ff4e9ac items=0 ppid=2066 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.505000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 08:38:12.550000 audit[2210]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:38:12.550000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffda59ee580 a2=0 a3=7ffda59ee56c items=0 ppid=2066 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.550000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:38:12.565000 audit[2210]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:38:12.565000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffda59ee580 a2=0 a3=7ffda59ee56c items=0 ppid=2066 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.565000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:38:12.567000 audit[2215]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.567000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffad059b90 a2=0 a3=7fffad059b7c items=0 ppid=2066 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.567000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 08:38:12.571000 audit[2217]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.571000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc18be8af0 a2=0 a3=7ffc18be8adc items=0 ppid=2066 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.571000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 13 08:38:12.575000 audit[2220]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.575000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe138b5d20 a2=0 a3=7ffe138b5d0c items=0 ppid=2066 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.575000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 13 08:38:12.576000 audit[2221]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.576000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffca2c1930 a2=0 a3=7fffca2c191c items=0 ppid=2066 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.576000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 08:38:12.582000 audit[2223]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.582000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff657837e0 a2=0 a3=7fff657837cc items=0 ppid=2066 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.582000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 08:38:12.583000 audit[2224]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.583000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcaf4a51f0 a2=0 a3=7ffcaf4a51dc items=0 ppid=2066 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.583000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 08:38:12.588000 audit[2226]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2226 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.588000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd01b089f0 a2=0 a3=7ffd01b089dc items=0 ppid=2066 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.588000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 13 08:38:12.596000 audit[2229]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.596000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff473b06d0 a2=0 a3=7fff473b06bc items=0 ppid=2066 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.596000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 08:38:12.598000 audit[2230]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.598000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe26aa2130 a2=0 a3=7ffe26aa211c items=0 ppid=2066 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.598000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 08:38:12.607000 audit[2232]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.607000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe5f5b9f50 a2=0 a3=7ffe5f5b9f3c items=0 ppid=2066 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.607000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 08:38:12.609000 audit[2233]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.609000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc98e0da80 a2=0 a3=7ffc98e0da6c items=0 ppid=2066 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.609000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 08:38:12.615000 audit[2235]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.615000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffdc821150 a2=0 a3=7fffdc82113c items=0 ppid=2066 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.615000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 08:38:12.621000 audit[2238]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2238 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.621000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff60ef15d0 a2=0 a3=7fff60ef15bc items=0 ppid=2066 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.621000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 08:38:12.624000 audit[2241]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.624000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd14d5d40 a2=0 a3=7ffdd14d5d2c items=0 ppid=2066 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.624000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 13 08:38:12.625000 audit[2242]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.625000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc5cf3a700 a2=0 a3=7ffc5cf3a6ec items=0 ppid=2066 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.625000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 08:38:12.627000 audit[2244]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.627000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe945db140 a2=0 a3=7ffe945db12c items=0 ppid=2066 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.627000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 08:38:12.630000 audit[2247]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.630000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc05b76a10 a2=0 a3=7ffc05b769fc items=0 ppid=2066 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.630000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 08:38:12.631000 audit[2248]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.631000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff62745f20 a2=0 a3=7fff62745f0c items=0 ppid=2066 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.631000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 08:38:12.633000 audit[2250]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.633000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff77aee4d0 a2=0 a3=7fff77aee4bc items=0 ppid=2066 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.633000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 08:38:12.634000 audit[2251]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.634000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff544c2ce0 a2=0 a3=7fff544c2ccc items=0 ppid=2066 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.634000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 08:38:12.637000 audit[2253]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.637000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff8fca2b20 a2=0 a3=7fff8fca2b0c items=0 ppid=2066 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.637000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 08:38:12.641000 audit[2256]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:38:12.641000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffddead8cc0 a2=0 a3=7ffddead8cac items=0 ppid=2066 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.641000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 08:38:12.644000 audit[2258]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 08:38:12.644000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffcc3b84550 a2=0 a3=7ffcc3b8453c items=0 ppid=2066 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.644000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:38:12.645000 audit[2258]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 08:38:12.645000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffcc3b84550 a2=0 a3=7ffcc3b8453c items=0 ppid=2066 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:12.645000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:38:12.725828 systemd[1]: run-containerd-runc-k8s.io-e4a8e254c09e6c32459082a8641c619dba9815a068cea35f5b42c69169518baa-runc.uGmd6F.mount: Deactivated successfully. May 13 08:38:13.784572 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4239859272.mount: Deactivated successfully. May 13 08:38:14.880708 env[1160]: time="2025-05-13T08:38:14.880666827Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:14.883872 env[1160]: time="2025-05-13T08:38:14.883850069Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:14.888433 env[1160]: time="2025-05-13T08:38:14.888412755Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:14.893147 env[1160]: time="2025-05-13T08:38:14.893125874Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:14.895079 env[1160]: time="2025-05-13T08:38:14.895053817Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 13 08:38:14.903181 env[1160]: time="2025-05-13T08:38:14.903154936Z" level=info msg="CreateContainer within sandbox \"5ea41f6c411cf40da01dae03948b2b890be68c402de891330c4103f63cf80a47\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 13 08:38:14.919418 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1271334313.mount: Deactivated successfully. May 13 08:38:14.925294 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2173951323.mount: Deactivated successfully. May 13 08:38:14.935597 env[1160]: time="2025-05-13T08:38:14.935563511Z" level=info msg="CreateContainer within sandbox \"5ea41f6c411cf40da01dae03948b2b890be68c402de891330c4103f63cf80a47\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"424e1eb063c87000a6ca8fc4a30a7b5983521108fe7341bbe8c5a4c1b42c478a\"" May 13 08:38:14.938657 env[1160]: time="2025-05-13T08:38:14.938616185Z" level=info msg="StartContainer for \"424e1eb063c87000a6ca8fc4a30a7b5983521108fe7341bbe8c5a4c1b42c478a\"" May 13 08:38:14.969449 systemd[1]: Started cri-containerd-424e1eb063c87000a6ca8fc4a30a7b5983521108fe7341bbe8c5a4c1b42c478a.scope. May 13 08:38:14.994201 kernel: kauditd_printk_skb: 320 callbacks suppressed May 13 08:38:14.994294 kernel: audit: type=1400 audit(1747125494.987:848): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:14.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:14.999213 kernel: audit: type=1400 audit(1747125494.987:849): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:14.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.004040 kernel: audit: type=1400 audit(1747125494.987:850): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:14.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.008854 kernel: audit: type=1400 audit(1747125494.987:851): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:14.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.013648 kernel: audit: type=1400 audit(1747125494.987:852): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:14.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.018346 kernel: audit: type=1400 audit(1747125494.987:853): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:14.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:14.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.027682 kernel: audit: type=1400 audit(1747125494.987:854): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:14.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.032502 kernel: audit: type=1400 audit(1747125494.987:855): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:14.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:14.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.042373 kernel: audit: type=1400 audit(1747125494.987:856): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.042551 kernel: audit: type=1400 audit(1747125494.998:857): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:14.998000 audit: BPF prog-id=117 op=LOAD May 13 08:38:14.998000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:14.998000 audit[2267]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2079 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:14.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432346531656230363363383730303061366361386663346133306137 May 13 08:38:14.998000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:14.998000 audit[2267]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2079 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:14.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432346531656230363363383730303061366361386663346133306137 May 13 08:38:14.998000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:14.998000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:14.998000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:14.998000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:14.998000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:14.998000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:14.998000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:14.998000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:14.998000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:14.998000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:14.998000 audit: BPF prog-id=118 op=LOAD May 13 08:38:14.998000 audit[2267]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003948d0 items=0 ppid=2079 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:14.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432346531656230363363383730303061366361386663346133306137 May 13 08:38:15.003000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.003000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.003000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.003000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.003000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.003000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.003000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.003000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.003000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.003000 audit: BPF prog-id=119 op=LOAD May 13 08:38:15.003000 audit[2267]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000394918 items=0 ppid=2079 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:15.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432346531656230363363383730303061366361386663346133306137 May 13 08:38:15.008000 audit: BPF prog-id=119 op=UNLOAD May 13 08:38:15.008000 audit: BPF prog-id=118 op=UNLOAD May 13 08:38:15.008000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.008000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.008000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.008000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.008000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.008000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.008000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.008000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.008000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.008000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:15.008000 audit: BPF prog-id=120 op=LOAD May 13 08:38:15.008000 audit[2267]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000394d28 items=0 ppid=2079 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:15.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432346531656230363363383730303061366361386663346133306137 May 13 08:38:15.052755 env[1160]: time="2025-05-13T08:38:15.052701005Z" level=info msg="StartContainer for \"424e1eb063c87000a6ca8fc4a30a7b5983521108fe7341bbe8c5a4c1b42c478a\" returns successfully" May 13 08:38:18.273000 audit[2301]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:38:18.273000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff190d9bb0 a2=0 a3=7fff190d9b9c items=0 ppid=2066 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:18.273000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:38:18.287000 audit[2301]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:38:18.287000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff190d9bb0 a2=0 a3=0 items=0 ppid=2066 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:18.287000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:38:18.319000 audit[2303]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:38:18.319000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffd9c53e60 a2=0 a3=7fffd9c53e4c items=0 ppid=2066 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:18.319000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:38:18.324000 audit[2303]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:38:18.324000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffd9c53e60 a2=0 a3=0 items=0 ppid=2066 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:18.324000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:38:18.478950 kubelet[1940]: I0513 08:38:18.478883 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6f6897fdc5-5rq8p" podStartSLOduration=4.782408902 podStartE2EDuration="7.478867247s" podCreationTimestamp="2025-05-13 08:38:11 +0000 UTC" firstStartedPulling="2025-05-13 08:38:12.20236287 +0000 UTC m=+6.155482551" lastFinishedPulling="2025-05-13 08:38:14.898821215 +0000 UTC m=+8.851940896" observedRunningTime="2025-05-13 08:38:15.477829602 +0000 UTC m=+9.430949314" watchObservedRunningTime="2025-05-13 08:38:18.478867247 +0000 UTC m=+12.431986938" May 13 08:38:18.484873 systemd[1]: Created slice kubepods-besteffort-podc2778909_5a6f_4e29_8251_baaabe235826.slice. May 13 08:38:18.536637 kubelet[1940]: I0513 08:38:18.536520 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bhdbb\" (UniqueName: \"kubernetes.io/projected/c2778909-5a6f-4e29-8251-baaabe235826-kube-api-access-bhdbb\") pod \"calico-typha-57cb5f956f-ncdks\" (UID: \"c2778909-5a6f-4e29-8251-baaabe235826\") " pod="calico-system/calico-typha-57cb5f956f-ncdks" May 13 08:38:18.536637 kubelet[1940]: I0513 08:38:18.536575 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c2778909-5a6f-4e29-8251-baaabe235826-tigera-ca-bundle\") pod \"calico-typha-57cb5f956f-ncdks\" (UID: \"c2778909-5a6f-4e29-8251-baaabe235826\") " pod="calico-system/calico-typha-57cb5f956f-ncdks" May 13 08:38:18.536637 kubelet[1940]: I0513 08:38:18.536605 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/c2778909-5a6f-4e29-8251-baaabe235826-typha-certs\") pod \"calico-typha-57cb5f956f-ncdks\" (UID: \"c2778909-5a6f-4e29-8251-baaabe235826\") " pod="calico-system/calico-typha-57cb5f956f-ncdks" May 13 08:38:18.653137 systemd[1]: Created slice kubepods-besteffort-pod0527b11a_b7ec_40ec_8895_4f080bc0d33e.slice. May 13 08:38:18.737789 kubelet[1940]: I0513 08:38:18.737743 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0527b11a-b7ec-40ec-8895-4f080bc0d33e-xtables-lock\") pod \"calico-node-kzxdb\" (UID: \"0527b11a-b7ec-40ec-8895-4f080bc0d33e\") " pod="calico-system/calico-node-kzxdb" May 13 08:38:18.737789 kubelet[1940]: I0513 08:38:18.737787 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0527b11a-b7ec-40ec-8895-4f080bc0d33e-var-lib-calico\") pod \"calico-node-kzxdb\" (UID: \"0527b11a-b7ec-40ec-8895-4f080bc0d33e\") " pod="calico-system/calico-node-kzxdb" May 13 08:38:18.737981 kubelet[1940]: I0513 08:38:18.737823 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/0527b11a-b7ec-40ec-8895-4f080bc0d33e-cni-log-dir\") pod \"calico-node-kzxdb\" (UID: \"0527b11a-b7ec-40ec-8895-4f080bc0d33e\") " pod="calico-system/calico-node-kzxdb" May 13 08:38:18.737981 kubelet[1940]: I0513 08:38:18.737845 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0527b11a-b7ec-40ec-8895-4f080bc0d33e-lib-modules\") pod \"calico-node-kzxdb\" (UID: \"0527b11a-b7ec-40ec-8895-4f080bc0d33e\") " pod="calico-system/calico-node-kzxdb" May 13 08:38:18.737981 kubelet[1940]: I0513 08:38:18.737864 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/0527b11a-b7ec-40ec-8895-4f080bc0d33e-cni-net-dir\") pod \"calico-node-kzxdb\" (UID: \"0527b11a-b7ec-40ec-8895-4f080bc0d33e\") " pod="calico-system/calico-node-kzxdb" May 13 08:38:18.737981 kubelet[1940]: I0513 08:38:18.737900 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/0527b11a-b7ec-40ec-8895-4f080bc0d33e-var-run-calico\") pod \"calico-node-kzxdb\" (UID: \"0527b11a-b7ec-40ec-8895-4f080bc0d33e\") " pod="calico-system/calico-node-kzxdb" May 13 08:38:18.737981 kubelet[1940]: I0513 08:38:18.737921 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/0527b11a-b7ec-40ec-8895-4f080bc0d33e-cni-bin-dir\") pod \"calico-node-kzxdb\" (UID: \"0527b11a-b7ec-40ec-8895-4f080bc0d33e\") " pod="calico-system/calico-node-kzxdb" May 13 08:38:18.738121 kubelet[1940]: I0513 08:38:18.737939 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/0527b11a-b7ec-40ec-8895-4f080bc0d33e-policysync\") pod \"calico-node-kzxdb\" (UID: \"0527b11a-b7ec-40ec-8895-4f080bc0d33e\") " pod="calico-system/calico-node-kzxdb" May 13 08:38:18.738121 kubelet[1940]: I0513 08:38:18.737958 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/0527b11a-b7ec-40ec-8895-4f080bc0d33e-flexvol-driver-host\") pod \"calico-node-kzxdb\" (UID: \"0527b11a-b7ec-40ec-8895-4f080bc0d33e\") " pod="calico-system/calico-node-kzxdb" May 13 08:38:18.738121 kubelet[1940]: I0513 08:38:18.737996 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sp5f4\" (UniqueName: \"kubernetes.io/projected/0527b11a-b7ec-40ec-8895-4f080bc0d33e-kube-api-access-sp5f4\") pod \"calico-node-kzxdb\" (UID: \"0527b11a-b7ec-40ec-8895-4f080bc0d33e\") " pod="calico-system/calico-node-kzxdb" May 13 08:38:18.738121 kubelet[1940]: I0513 08:38:18.738018 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/0527b11a-b7ec-40ec-8895-4f080bc0d33e-node-certs\") pod \"calico-node-kzxdb\" (UID: \"0527b11a-b7ec-40ec-8895-4f080bc0d33e\") " pod="calico-system/calico-node-kzxdb" May 13 08:38:18.738121 kubelet[1940]: I0513 08:38:18.738037 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0527b11a-b7ec-40ec-8895-4f080bc0d33e-tigera-ca-bundle\") pod \"calico-node-kzxdb\" (UID: \"0527b11a-b7ec-40ec-8895-4f080bc0d33e\") " pod="calico-system/calico-node-kzxdb" May 13 08:38:18.757554 kubelet[1940]: E0513 08:38:18.757514 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wnsw4" podUID="14293fd4-c5b5-4b77-9cbd-af7d79ab2352" May 13 08:38:18.789216 env[1160]: time="2025-05-13T08:38:18.788783025Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-57cb5f956f-ncdks,Uid:c2778909-5a6f-4e29-8251-baaabe235826,Namespace:calico-system,Attempt:0,}" May 13 08:38:18.821688 env[1160]: time="2025-05-13T08:38:18.820839822Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 08:38:18.821688 env[1160]: time="2025-05-13T08:38:18.820879949Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 08:38:18.821688 env[1160]: time="2025-05-13T08:38:18.820893925Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 08:38:18.821688 env[1160]: time="2025-05-13T08:38:18.821017679Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3b60ee38683228716dbeb1cc23c3bc43427040f48e8cc24391fd2dd21079bfa1 pid=2312 runtime=io.containerd.runc.v2 May 13 08:38:18.839056 kubelet[1940]: I0513 08:38:18.839001 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/14293fd4-c5b5-4b77-9cbd-af7d79ab2352-socket-dir\") pod \"csi-node-driver-wnsw4\" (UID: \"14293fd4-c5b5-4b77-9cbd-af7d79ab2352\") " pod="calico-system/csi-node-driver-wnsw4" May 13 08:38:18.839210 kubelet[1940]: I0513 08:38:18.839145 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/14293fd4-c5b5-4b77-9cbd-af7d79ab2352-kubelet-dir\") pod \"csi-node-driver-wnsw4\" (UID: \"14293fd4-c5b5-4b77-9cbd-af7d79ab2352\") " pod="calico-system/csi-node-driver-wnsw4" May 13 08:38:18.839210 kubelet[1940]: I0513 08:38:18.839169 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dxsxh\" (UniqueName: \"kubernetes.io/projected/14293fd4-c5b5-4b77-9cbd-af7d79ab2352-kube-api-access-dxsxh\") pod \"csi-node-driver-wnsw4\" (UID: \"14293fd4-c5b5-4b77-9cbd-af7d79ab2352\") " pod="calico-system/csi-node-driver-wnsw4" May 13 08:38:18.839275 kubelet[1940]: I0513 08:38:18.839228 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/14293fd4-c5b5-4b77-9cbd-af7d79ab2352-varrun\") pod \"csi-node-driver-wnsw4\" (UID: \"14293fd4-c5b5-4b77-9cbd-af7d79ab2352\") " pod="calico-system/csi-node-driver-wnsw4" May 13 08:38:18.839275 kubelet[1940]: I0513 08:38:18.839249 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/14293fd4-c5b5-4b77-9cbd-af7d79ab2352-registration-dir\") pod \"csi-node-driver-wnsw4\" (UID: \"14293fd4-c5b5-4b77-9cbd-af7d79ab2352\") " pod="calico-system/csi-node-driver-wnsw4" May 13 08:38:18.851670 kubelet[1940]: E0513 08:38:18.851591 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.851670 kubelet[1940]: W0513 08:38:18.851618 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.851670 kubelet[1940]: E0513 08:38:18.851648 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.861768 systemd[1]: Started cri-containerd-3b60ee38683228716dbeb1cc23c3bc43427040f48e8cc24391fd2dd21079bfa1.scope. May 13 08:38:18.868841 kubelet[1940]: E0513 08:38:18.868763 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.868841 kubelet[1940]: W0513 08:38:18.868783 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.868841 kubelet[1940]: E0513 08:38:18.868802 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.886000 audit: BPF prog-id=121 op=LOAD May 13 08:38:18.887000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2312 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:18.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362363065653338363833323238373136646265623163633233633362 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2312 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:18.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362363065653338363833323238373136646265623163633233633362 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit: BPF prog-id=122 op=LOAD May 13 08:38:18.887000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c0e50 items=0 ppid=2312 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:18.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362363065653338363833323238373136646265623163633233633362 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit: BPF prog-id=123 op=LOAD May 13 08:38:18.887000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c0e98 items=0 ppid=2312 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:18.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362363065653338363833323238373136646265623163633233633362 May 13 08:38:18.887000 audit: BPF prog-id=123 op=UNLOAD May 13 08:38:18.887000 audit: BPF prog-id=122 op=UNLOAD May 13 08:38:18.887000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:18.887000 audit: BPF prog-id=124 op=LOAD May 13 08:38:18.887000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c12a8 items=0 ppid=2312 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:18.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362363065653338363833323238373136646265623163633233633362 May 13 08:38:18.921208 env[1160]: time="2025-05-13T08:38:18.921169921Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-57cb5f956f-ncdks,Uid:c2778909-5a6f-4e29-8251-baaabe235826,Namespace:calico-system,Attempt:0,} returns sandbox id \"3b60ee38683228716dbeb1cc23c3bc43427040f48e8cc24391fd2dd21079bfa1\"" May 13 08:38:18.923270 env[1160]: time="2025-05-13T08:38:18.923231598Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 13 08:38:18.940009 kubelet[1940]: E0513 08:38:18.939969 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.940009 kubelet[1940]: W0513 08:38:18.939999 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.940236 kubelet[1940]: E0513 08:38:18.940018 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.940270 kubelet[1940]: E0513 08:38:18.940244 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.940270 kubelet[1940]: W0513 08:38:18.940253 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.940270 kubelet[1940]: E0513 08:38:18.940266 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.940468 kubelet[1940]: E0513 08:38:18.940449 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.940468 kubelet[1940]: W0513 08:38:18.940462 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.940582 kubelet[1940]: E0513 08:38:18.940472 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.940706 kubelet[1940]: E0513 08:38:18.940688 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.940706 kubelet[1940]: W0513 08:38:18.940701 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.940783 kubelet[1940]: E0513 08:38:18.940714 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.941012 kubelet[1940]: E0513 08:38:18.940878 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.941012 kubelet[1940]: W0513 08:38:18.940890 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.941012 kubelet[1940]: E0513 08:38:18.940899 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.941270 kubelet[1940]: E0513 08:38:18.941185 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.941270 kubelet[1940]: W0513 08:38:18.941205 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.941270 kubelet[1940]: E0513 08:38:18.941230 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.941531 kubelet[1940]: E0513 08:38:18.941398 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.941531 kubelet[1940]: W0513 08:38:18.941411 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.941531 kubelet[1940]: E0513 08:38:18.941433 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.941797 kubelet[1940]: E0513 08:38:18.941694 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.941797 kubelet[1940]: W0513 08:38:18.941705 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.941797 kubelet[1940]: E0513 08:38:18.941721 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.942032 kubelet[1940]: E0513 08:38:18.941946 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.942032 kubelet[1940]: W0513 08:38:18.941957 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.942032 kubelet[1940]: E0513 08:38:18.941982 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.942306 kubelet[1940]: E0513 08:38:18.942219 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.942306 kubelet[1940]: W0513 08:38:18.942230 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.942306 kubelet[1940]: E0513 08:38:18.942252 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.942713 kubelet[1940]: E0513 08:38:18.942452 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.942713 kubelet[1940]: W0513 08:38:18.942462 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.942713 kubelet[1940]: E0513 08:38:18.942501 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.942713 kubelet[1940]: E0513 08:38:18.942635 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.942713 kubelet[1940]: W0513 08:38:18.942644 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.942713 kubelet[1940]: E0513 08:38:18.942664 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.943027 kubelet[1940]: E0513 08:38:18.942941 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.943027 kubelet[1940]: W0513 08:38:18.942952 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.943027 kubelet[1940]: E0513 08:38:18.942975 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.943353 kubelet[1940]: E0513 08:38:18.943181 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.943353 kubelet[1940]: W0513 08:38:18.943191 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.943353 kubelet[1940]: E0513 08:38:18.943206 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.943642 kubelet[1940]: E0513 08:38:18.943533 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.943642 kubelet[1940]: W0513 08:38:18.943544 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.943642 kubelet[1940]: E0513 08:38:18.943558 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.943901 kubelet[1940]: E0513 08:38:18.943804 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.943901 kubelet[1940]: W0513 08:38:18.943814 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.943901 kubelet[1940]: E0513 08:38:18.943829 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.944128 kubelet[1940]: E0513 08:38:18.944045 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.944128 kubelet[1940]: W0513 08:38:18.944055 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.944128 kubelet[1940]: E0513 08:38:18.944078 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.944533 kubelet[1940]: E0513 08:38:18.944284 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.944533 kubelet[1940]: W0513 08:38:18.944295 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.944533 kubelet[1940]: E0513 08:38:18.944325 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.944533 kubelet[1940]: E0513 08:38:18.944441 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.944533 kubelet[1940]: W0513 08:38:18.944450 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.944533 kubelet[1940]: E0513 08:38:18.944470 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.945013 kubelet[1940]: E0513 08:38:18.944760 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.945013 kubelet[1940]: W0513 08:38:18.944770 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.945013 kubelet[1940]: E0513 08:38:18.944794 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.945013 kubelet[1940]: E0513 08:38:18.944922 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.945013 kubelet[1940]: W0513 08:38:18.944930 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.945013 kubelet[1940]: E0513 08:38:18.944945 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.945368 kubelet[1940]: E0513 08:38:18.945237 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.945368 kubelet[1940]: W0513 08:38:18.945248 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.945368 kubelet[1940]: E0513 08:38:18.945274 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.945899 kubelet[1940]: E0513 08:38:18.945671 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.945899 kubelet[1940]: W0513 08:38:18.945683 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.945899 kubelet[1940]: E0513 08:38:18.945712 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.945899 kubelet[1940]: E0513 08:38:18.945880 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.945899 kubelet[1940]: W0513 08:38:18.945890 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.946090 kubelet[1940]: E0513 08:38:18.945905 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.946090 kubelet[1940]: E0513 08:38:18.946067 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.946090 kubelet[1940]: W0513 08:38:18.946076 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.946090 kubelet[1940]: E0513 08:38:18.946086 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.956943 kubelet[1940]: E0513 08:38:18.956924 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:18.957312 env[1160]: time="2025-05-13T08:38:18.957279481Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-kzxdb,Uid:0527b11a-b7ec-40ec-8895-4f080bc0d33e,Namespace:calico-system,Attempt:0,}" May 13 08:38:18.957723 kubelet[1940]: W0513 08:38:18.957709 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:18.957858 kubelet[1940]: E0513 08:38:18.957845 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:18.984563 env[1160]: time="2025-05-13T08:38:18.984446386Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 08:38:18.984773 env[1160]: time="2025-05-13T08:38:18.984536476Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 08:38:18.984773 env[1160]: time="2025-05-13T08:38:18.984565390Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 08:38:18.985617 env[1160]: time="2025-05-13T08:38:18.984890314Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/638c67f0c9cfffb07f1098fcc8b28e3242f5410aeebfa0017f78f79884a61a3b pid=2383 runtime=io.containerd.runc.v2 May 13 08:38:19.003579 systemd[1]: Started cri-containerd-638c67f0c9cfffb07f1098fcc8b28e3242f5410aeebfa0017f78f79884a61a3b.scope. May 13 08:38:19.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.027000 audit: BPF prog-id=125 op=LOAD May 13 08:38:19.029000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.029000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2383 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:19.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633386336376630633963666666623037663130393866636338623238 May 13 08:38:19.029000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.029000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2383 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:19.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633386336376630633963666666623037663130393866636338623238 May 13 08:38:19.029000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.029000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.029000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.029000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.029000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.029000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.029000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.029000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.029000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.029000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.029000 audit: BPF prog-id=126 op=LOAD May 13 08:38:19.029000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000388350 items=0 ppid=2383 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:19.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633386336376630633963666666623037663130393866636338623238 May 13 08:38:19.030000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.030000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.030000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.030000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.030000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.030000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.030000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.030000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.030000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.030000 audit: BPF prog-id=127 op=LOAD May 13 08:38:19.030000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000388398 items=0 ppid=2383 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:19.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633386336376630633963666666623037663130393866636338623238 May 13 08:38:19.030000 audit: BPF prog-id=127 op=UNLOAD May 13 08:38:19.030000 audit: BPF prog-id=126 op=UNLOAD May 13 08:38:19.030000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.030000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.030000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.030000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.030000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.030000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.030000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.030000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.030000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.030000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:19.030000 audit: BPF prog-id=128 op=LOAD May 13 08:38:19.030000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003887a8 items=0 ppid=2383 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:19.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633386336376630633963666666623037663130393866636338623238 May 13 08:38:19.052423 env[1160]: time="2025-05-13T08:38:19.046139835Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-kzxdb,Uid:0527b11a-b7ec-40ec-8895-4f080bc0d33e,Namespace:calico-system,Attempt:0,} returns sandbox id \"638c67f0c9cfffb07f1098fcc8b28e3242f5410aeebfa0017f78f79884a61a3b\"" May 13 08:38:19.349000 audit[2417]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:38:19.349000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffef4411ac0 a2=0 a3=7ffef4411aac items=0 ppid=2066 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:19.349000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:38:19.353000 audit[2417]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:38:19.353000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffef4411ac0 a2=0 a3=0 items=0 ppid=2066 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:19.353000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:38:20.358613 kubelet[1940]: E0513 08:38:20.358438 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wnsw4" podUID="14293fd4-c5b5-4b77-9cbd-af7d79ab2352" May 13 08:38:22.358910 kubelet[1940]: E0513 08:38:22.358470 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wnsw4" podUID="14293fd4-c5b5-4b77-9cbd-af7d79ab2352" May 13 08:38:22.718771 env[1160]: time="2025-05-13T08:38:22.718740353Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:22.722393 env[1160]: time="2025-05-13T08:38:22.722370723Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:22.724400 env[1160]: time="2025-05-13T08:38:22.724378862Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:22.726700 env[1160]: time="2025-05-13T08:38:22.726446725Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:22.726775 env[1160]: time="2025-05-13T08:38:22.726740138Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 13 08:38:22.728966 env[1160]: time="2025-05-13T08:38:22.728796148Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 13 08:38:22.748056 env[1160]: time="2025-05-13T08:38:22.748011516Z" level=info msg="CreateContainer within sandbox \"3b60ee38683228716dbeb1cc23c3bc43427040f48e8cc24391fd2dd21079bfa1\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 13 08:38:22.764050 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1183115146.mount: Deactivated successfully. May 13 08:38:22.777598 env[1160]: time="2025-05-13T08:38:22.777550516Z" level=info msg="CreateContainer within sandbox \"3b60ee38683228716dbeb1cc23c3bc43427040f48e8cc24391fd2dd21079bfa1\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"46d7e25b10c44036b61f481b3e59b3a69a36ab67e2efcc203e75e8e392f58455\"" May 13 08:38:22.780398 env[1160]: time="2025-05-13T08:38:22.779336345Z" level=info msg="StartContainer for \"46d7e25b10c44036b61f481b3e59b3a69a36ab67e2efcc203e75e8e392f58455\"" May 13 08:38:22.802279 systemd[1]: Started cri-containerd-46d7e25b10c44036b61f481b3e59b3a69a36ab67e2efcc203e75e8e392f58455.scope. May 13 08:38:22.821524 kernel: kauditd_printk_skb: 179 callbacks suppressed May 13 08:38:22.821633 kernel: audit: type=1400 audit(1747125502.818:908): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.831535 kernel: audit: type=1400 audit(1747125502.818:909): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.837580 kernel: audit: type=1400 audit(1747125502.818:910): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.842501 kernel: audit: type=1400 audit(1747125502.818:911): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.848538 kernel: audit: type=1400 audit(1747125502.818:912): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.858060 kernel: audit: type=1400 audit(1747125502.818:913): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.858126 kernel: audit: type=1400 audit(1747125502.818:914): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.859082 kernel: audit: type=1400 audit(1747125502.818:915): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.876272 kernel: audit: type=1400 audit(1747125502.818:916): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.876366 kernel: audit: type=1400 audit(1747125502.820:917): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.820000 audit: BPF prog-id=129 op=LOAD May 13 08:38:22.825000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2312 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:22.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436643765323562313063343430333662363166343831623365353962 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2312 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:22.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436643765323562313063343430333662363166343831623365353962 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit: BPF prog-id=130 op=LOAD May 13 08:38:22.825000 audit[2427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000383dc0 items=0 ppid=2312 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:22.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436643765323562313063343430333662363166343831623365353962 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit: BPF prog-id=131 op=LOAD May 13 08:38:22.825000 audit[2427]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000383e08 items=0 ppid=2312 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:22.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436643765323562313063343430333662363166343831623365353962 May 13 08:38:22.825000 audit: BPF prog-id=131 op=UNLOAD May 13 08:38:22.825000 audit: BPF prog-id=130 op=UNLOAD May 13 08:38:22.825000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { perfmon } for pid=2427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit[2427]: AVC avc: denied { bpf } for pid=2427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:22.825000 audit: BPF prog-id=132 op=LOAD May 13 08:38:22.825000 audit[2427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003de218 items=0 ppid=2312 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:22.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436643765323562313063343430333662363166343831623365353962 May 13 08:38:22.888264 env[1160]: time="2025-05-13T08:38:22.888208744Z" level=info msg="StartContainer for \"46d7e25b10c44036b61f481b3e59b3a69a36ab67e2efcc203e75e8e392f58455\" returns successfully" May 13 08:38:23.461942 kubelet[1940]: E0513 08:38:23.461881 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.461942 kubelet[1940]: W0513 08:38:23.461930 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.462761 kubelet[1940]: E0513 08:38:23.461971 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.463530 kubelet[1940]: E0513 08:38:23.462858 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.463530 kubelet[1940]: W0513 08:38:23.462892 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.463530 kubelet[1940]: E0513 08:38:23.462916 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.463530 kubelet[1940]: E0513 08:38:23.463206 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.463530 kubelet[1940]: W0513 08:38:23.463226 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.463530 kubelet[1940]: E0513 08:38:23.463247 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.464457 kubelet[1940]: E0513 08:38:23.464328 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.464457 kubelet[1940]: W0513 08:38:23.464357 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.464457 kubelet[1940]: E0513 08:38:23.464380 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.464815 kubelet[1940]: E0513 08:38:23.464769 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.464815 kubelet[1940]: W0513 08:38:23.464806 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.464999 kubelet[1940]: E0513 08:38:23.464828 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.465746 kubelet[1940]: E0513 08:38:23.465126 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.465746 kubelet[1940]: W0513 08:38:23.465157 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.465746 kubelet[1940]: E0513 08:38:23.465179 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.465746 kubelet[1940]: E0513 08:38:23.465633 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.465746 kubelet[1940]: W0513 08:38:23.465654 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.465746 kubelet[1940]: E0513 08:38:23.465674 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.466178 kubelet[1940]: E0513 08:38:23.465976 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.466178 kubelet[1940]: W0513 08:38:23.465996 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.466178 kubelet[1940]: E0513 08:38:23.466016 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.466369 kubelet[1940]: E0513 08:38:23.466326 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.466369 kubelet[1940]: W0513 08:38:23.466346 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.466544 kubelet[1940]: E0513 08:38:23.466367 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.466810 kubelet[1940]: E0513 08:38:23.466772 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.466810 kubelet[1940]: W0513 08:38:23.466805 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.466810 kubelet[1940]: E0513 08:38:23.466827 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.467162 kubelet[1940]: E0513 08:38:23.467123 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.467162 kubelet[1940]: W0513 08:38:23.467154 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.467162 kubelet[1940]: E0513 08:38:23.467175 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.467544 kubelet[1940]: E0513 08:38:23.467467 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.467644 kubelet[1940]: W0513 08:38:23.467529 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.467644 kubelet[1940]: E0513 08:38:23.467585 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.467947 kubelet[1940]: E0513 08:38:23.467900 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.467947 kubelet[1940]: W0513 08:38:23.467935 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.468149 kubelet[1940]: E0513 08:38:23.467955 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.468292 kubelet[1940]: E0513 08:38:23.468254 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.468292 kubelet[1940]: W0513 08:38:23.468285 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.468527 kubelet[1940]: E0513 08:38:23.468306 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.468729 kubelet[1940]: E0513 08:38:23.468663 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.468729 kubelet[1940]: W0513 08:38:23.468693 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.468729 kubelet[1940]: E0513 08:38:23.468714 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.473028 kubelet[1940]: I0513 08:38:23.472877 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-57cb5f956f-ncdks" podStartSLOduration=1.6674427299999999 podStartE2EDuration="5.472850345s" podCreationTimestamp="2025-05-13 08:38:18 +0000 UTC" firstStartedPulling="2025-05-13 08:38:18.922682721 +0000 UTC m=+12.875802402" lastFinishedPulling="2025-05-13 08:38:22.728090336 +0000 UTC m=+16.681210017" observedRunningTime="2025-05-13 08:38:23.460814863 +0000 UTC m=+17.413934594" watchObservedRunningTime="2025-05-13 08:38:23.472850345 +0000 UTC m=+17.425970076" May 13 08:38:23.476840 kubelet[1940]: E0513 08:38:23.476798 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.476840 kubelet[1940]: W0513 08:38:23.476836 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.477069 kubelet[1940]: E0513 08:38:23.476865 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.477532 kubelet[1940]: E0513 08:38:23.477459 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.477677 kubelet[1940]: W0513 08:38:23.477548 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.477677 kubelet[1940]: E0513 08:38:23.477587 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.477957 kubelet[1940]: E0513 08:38:23.477917 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.477957 kubelet[1940]: W0513 08:38:23.477948 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.478166 kubelet[1940]: E0513 08:38:23.477978 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.478419 kubelet[1940]: E0513 08:38:23.478351 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.478589 kubelet[1940]: W0513 08:38:23.478443 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.478589 kubelet[1940]: E0513 08:38:23.478479 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.478927 kubelet[1940]: E0513 08:38:23.478890 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.478927 kubelet[1940]: W0513 08:38:23.478917 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.479124 kubelet[1940]: E0513 08:38:23.479063 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.479329 kubelet[1940]: E0513 08:38:23.479253 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.479329 kubelet[1940]: W0513 08:38:23.479282 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.479657 kubelet[1940]: E0513 08:38:23.479420 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.479790 kubelet[1940]: E0513 08:38:23.479749 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.479790 kubelet[1940]: W0513 08:38:23.479769 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.479938 kubelet[1940]: E0513 08:38:23.479911 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.480171 kubelet[1940]: E0513 08:38:23.480134 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.480171 kubelet[1940]: W0513 08:38:23.480160 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.480699 kubelet[1940]: E0513 08:38:23.480201 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.480862 kubelet[1940]: E0513 08:38:23.480764 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.480862 kubelet[1940]: W0513 08:38:23.480787 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.481151 kubelet[1940]: E0513 08:38:23.481092 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.481151 kubelet[1940]: W0513 08:38:23.481132 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.481400 kubelet[1940]: E0513 08:38:23.481083 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.482579 kubelet[1940]: E0513 08:38:23.481749 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.482579 kubelet[1940]: E0513 08:38:23.481973 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.482579 kubelet[1940]: W0513 08:38:23.481994 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.482579 kubelet[1940]: E0513 08:38:23.482030 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.482579 kubelet[1940]: E0513 08:38:23.482315 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.482579 kubelet[1940]: W0513 08:38:23.482335 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.482579 kubelet[1940]: E0513 08:38:23.482355 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.483089 kubelet[1940]: E0513 08:38:23.482801 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.483089 kubelet[1940]: W0513 08:38:23.482823 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.483089 kubelet[1940]: E0513 08:38:23.482847 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.483827 kubelet[1940]: E0513 08:38:23.483368 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.483827 kubelet[1940]: W0513 08:38:23.483397 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.483827 kubelet[1940]: E0513 08:38:23.483555 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.483827 kubelet[1940]: E0513 08:38:23.483804 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.483827 kubelet[1940]: W0513 08:38:23.483824 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.484236 kubelet[1940]: E0513 08:38:23.483978 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.484236 kubelet[1940]: E0513 08:38:23.484176 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.484236 kubelet[1940]: W0513 08:38:23.484194 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.484236 kubelet[1940]: E0513 08:38:23.484217 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.484667 kubelet[1940]: E0513 08:38:23.484586 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.484667 kubelet[1940]: W0513 08:38:23.484616 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.484862 kubelet[1940]: E0513 08:38:23.484667 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:23.485664 kubelet[1940]: E0513 08:38:23.485594 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:23.485664 kubelet[1940]: W0513 08:38:23.485628 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:23.485664 kubelet[1940]: E0513 08:38:23.485650 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.358933 kubelet[1940]: E0513 08:38:24.358838 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wnsw4" podUID="14293fd4-c5b5-4b77-9cbd-af7d79ab2352" May 13 08:38:24.439395 kubelet[1940]: I0513 08:38:24.439352 1940 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 08:38:24.477783 kubelet[1940]: E0513 08:38:24.477748 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.478406 kubelet[1940]: W0513 08:38:24.478372 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.478774 kubelet[1940]: E0513 08:38:24.478739 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.479336 kubelet[1940]: E0513 08:38:24.479310 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.479556 kubelet[1940]: W0513 08:38:24.479478 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.479716 kubelet[1940]: E0513 08:38:24.479689 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.480267 kubelet[1940]: E0513 08:38:24.480241 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.480451 kubelet[1940]: W0513 08:38:24.480425 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.480674 kubelet[1940]: E0513 08:38:24.480646 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.481337 kubelet[1940]: E0513 08:38:24.481281 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.481559 kubelet[1940]: W0513 08:38:24.481527 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.481729 kubelet[1940]: E0513 08:38:24.481702 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.482296 kubelet[1940]: E0513 08:38:24.482271 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.482458 kubelet[1940]: W0513 08:38:24.482433 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.482712 kubelet[1940]: E0513 08:38:24.482677 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.483234 kubelet[1940]: E0513 08:38:24.483210 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.483402 kubelet[1940]: W0513 08:38:24.483377 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.483614 kubelet[1940]: E0513 08:38:24.483585 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.484142 kubelet[1940]: E0513 08:38:24.484119 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.484300 kubelet[1940]: W0513 08:38:24.484275 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.484466 kubelet[1940]: E0513 08:38:24.484440 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.485122 kubelet[1940]: E0513 08:38:24.485098 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.485298 kubelet[1940]: W0513 08:38:24.485272 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.485545 kubelet[1940]: E0513 08:38:24.485459 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.486181 kubelet[1940]: E0513 08:38:24.486114 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.486359 kubelet[1940]: W0513 08:38:24.486332 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.486591 kubelet[1940]: E0513 08:38:24.486561 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.487231 kubelet[1940]: E0513 08:38:24.487208 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.487390 kubelet[1940]: W0513 08:38:24.487365 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.487597 kubelet[1940]: E0513 08:38:24.487569 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.488128 kubelet[1940]: E0513 08:38:24.488104 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.488379 kubelet[1940]: W0513 08:38:24.488352 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.488624 kubelet[1940]: E0513 08:38:24.488596 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.489150 kubelet[1940]: E0513 08:38:24.489127 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.489367 kubelet[1940]: W0513 08:38:24.489333 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.489582 kubelet[1940]: E0513 08:38:24.489552 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.490131 kubelet[1940]: E0513 08:38:24.490104 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.490289 kubelet[1940]: W0513 08:38:24.490264 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.490463 kubelet[1940]: E0513 08:38:24.490436 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.491031 kubelet[1940]: E0513 08:38:24.491005 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.491199 kubelet[1940]: W0513 08:38:24.491174 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.491358 kubelet[1940]: E0513 08:38:24.491331 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.492012 kubelet[1940]: E0513 08:38:24.491985 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.492182 kubelet[1940]: W0513 08:38:24.492156 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.492327 kubelet[1940]: E0513 08:38:24.492302 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.493023 kubelet[1940]: E0513 08:38:24.492997 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.493181 kubelet[1940]: W0513 08:38:24.493156 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.493382 kubelet[1940]: E0513 08:38:24.493351 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.494091 kubelet[1940]: E0513 08:38:24.494065 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.494251 kubelet[1940]: W0513 08:38:24.494225 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.494451 kubelet[1940]: E0513 08:38:24.494421 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.494890 kubelet[1940]: E0513 08:38:24.494847 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.495013 kubelet[1940]: W0513 08:38:24.494890 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.495013 kubelet[1940]: E0513 08:38:24.494936 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.495426 kubelet[1940]: E0513 08:38:24.495356 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.495426 kubelet[1940]: W0513 08:38:24.495391 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.495426 kubelet[1940]: E0513 08:38:24.495425 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.495859 kubelet[1940]: E0513 08:38:24.495808 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.495859 kubelet[1940]: W0513 08:38:24.495838 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.496042 kubelet[1940]: E0513 08:38:24.495993 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.496289 kubelet[1940]: E0513 08:38:24.496218 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.496406 kubelet[1940]: W0513 08:38:24.496302 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.496550 kubelet[1940]: E0513 08:38:24.496461 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.496854 kubelet[1940]: E0513 08:38:24.496823 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.496854 kubelet[1940]: W0513 08:38:24.496851 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.497153 kubelet[1940]: E0513 08:38:24.497084 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.497533 kubelet[1940]: E0513 08:38:24.497434 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.497533 kubelet[1940]: W0513 08:38:24.497470 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.497731 kubelet[1940]: E0513 08:38:24.497571 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.498253 kubelet[1940]: E0513 08:38:24.498225 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.498429 kubelet[1940]: W0513 08:38:24.498402 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.498676 kubelet[1940]: E0513 08:38:24.498641 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.499006 kubelet[1940]: E0513 08:38:24.498975 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.499006 kubelet[1940]: W0513 08:38:24.499005 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.499199 kubelet[1940]: E0513 08:38:24.499037 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.499436 kubelet[1940]: E0513 08:38:24.499405 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.499436 kubelet[1940]: W0513 08:38:24.499432 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.499670 kubelet[1940]: E0513 08:38:24.499558 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.499902 kubelet[1940]: E0513 08:38:24.499872 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.499902 kubelet[1940]: W0513 08:38:24.499899 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.500084 kubelet[1940]: E0513 08:38:24.500047 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.500319 kubelet[1940]: E0513 08:38:24.500289 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.500319 kubelet[1940]: W0513 08:38:24.500315 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.500671 kubelet[1940]: E0513 08:38:24.500630 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.500984 kubelet[1940]: E0513 08:38:24.500949 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.500984 kubelet[1940]: W0513 08:38:24.500981 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.501187 kubelet[1940]: E0513 08:38:24.501015 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.501712 kubelet[1940]: E0513 08:38:24.501676 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.501712 kubelet[1940]: W0513 08:38:24.501709 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.501905 kubelet[1940]: E0513 08:38:24.501742 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.502106 kubelet[1940]: E0513 08:38:24.502077 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.502106 kubelet[1940]: W0513 08:38:24.502104 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.502292 kubelet[1940]: E0513 08:38:24.502126 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.502569 kubelet[1940]: E0513 08:38:24.502463 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.502708 kubelet[1940]: W0513 08:38:24.502544 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.502708 kubelet[1940]: E0513 08:38:24.502596 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:24.503308 kubelet[1940]: E0513 08:38:24.503276 1940 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:38:24.503308 kubelet[1940]: W0513 08:38:24.503305 1940 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:38:24.503585 kubelet[1940]: E0513 08:38:24.503327 1940 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:38:25.045800 env[1160]: time="2025-05-13T08:38:25.045734957Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:25.051897 env[1160]: time="2025-05-13T08:38:25.051847709Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:25.054652 env[1160]: time="2025-05-13T08:38:25.054604977Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:25.057368 env[1160]: time="2025-05-13T08:38:25.057318832Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:25.057966 env[1160]: time="2025-05-13T08:38:25.057914525Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 13 08:38:25.064542 env[1160]: time="2025-05-13T08:38:25.064442400Z" level=info msg="CreateContainer within sandbox \"638c67f0c9cfffb07f1098fcc8b28e3242f5410aeebfa0017f78f79884a61a3b\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 13 08:38:25.092477 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount152598039.mount: Deactivated successfully. May 13 08:38:25.102716 env[1160]: time="2025-05-13T08:38:25.102620533Z" level=info msg="CreateContainer within sandbox \"638c67f0c9cfffb07f1098fcc8b28e3242f5410aeebfa0017f78f79884a61a3b\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"950c93d304acee105e9243eb0d46e76059cd77014f0ce3feba16d97363e4d946\"" May 13 08:38:25.106344 env[1160]: time="2025-05-13T08:38:25.106287706Z" level=info msg="StartContainer for \"950c93d304acee105e9243eb0d46e76059cd77014f0ce3feba16d97363e4d946\"" May 13 08:38:25.156526 systemd[1]: Started cri-containerd-950c93d304acee105e9243eb0d46e76059cd77014f0ce3feba16d97363e4d946.scope. May 13 08:38:25.158508 systemd[1]: run-containerd-runc-k8s.io-950c93d304acee105e9243eb0d46e76059cd77014f0ce3feba16d97363e4d946-runc.YewaXu.mount: Deactivated successfully. May 13 08:38:25.181000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f6c8435ff38 items=0 ppid=2383 pid=2531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:25.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935306339336433303461636565313035653932343365623064343665 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit: BPF prog-id=133 op=LOAD May 13 08:38:25.181000 audit[2531]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000232968 items=0 ppid=2383 pid=2531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:25.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935306339336433303461636565313035653932343365623064343665 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit: BPF prog-id=134 op=LOAD May 13 08:38:25.181000 audit[2531]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002329b8 items=0 ppid=2383 pid=2531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:25.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935306339336433303461636565313035653932343365623064343665 May 13 08:38:25.181000 audit: BPF prog-id=134 op=UNLOAD May 13 08:38:25.181000 audit: BPF prog-id=133 op=UNLOAD May 13 08:38:25.181000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { perfmon } for pid=2531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit[2531]: AVC avc: denied { bpf } for pid=2531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:25.181000 audit: BPF prog-id=135 op=LOAD May 13 08:38:25.181000 audit[2531]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000232a48 items=0 ppid=2383 pid=2531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:25.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935306339336433303461636565313035653932343365623064343665 May 13 08:38:25.202543 env[1160]: time="2025-05-13T08:38:25.202396717Z" level=info msg="StartContainer for \"950c93d304acee105e9243eb0d46e76059cd77014f0ce3feba16d97363e4d946\" returns successfully" May 13 08:38:25.209618 systemd[1]: cri-containerd-950c93d304acee105e9243eb0d46e76059cd77014f0ce3feba16d97363e4d946.scope: Deactivated successfully. May 13 08:38:25.212000 audit: BPF prog-id=135 op=UNLOAD May 13 08:38:25.831009 env[1160]: time="2025-05-13T08:38:25.830820282Z" level=info msg="shim disconnected" id=950c93d304acee105e9243eb0d46e76059cd77014f0ce3feba16d97363e4d946 May 13 08:38:25.831009 env[1160]: time="2025-05-13T08:38:25.830993768Z" level=warning msg="cleaning up after shim disconnected" id=950c93d304acee105e9243eb0d46e76059cd77014f0ce3feba16d97363e4d946 namespace=k8s.io May 13 08:38:25.831461 env[1160]: time="2025-05-13T08:38:25.831020770Z" level=info msg="cleaning up dead shim" May 13 08:38:25.848351 env[1160]: time="2025-05-13T08:38:25.848248162Z" level=warning msg="cleanup warnings time=\"2025-05-13T08:38:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2574 runtime=io.containerd.runc.v2\n" May 13 08:38:26.087091 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-950c93d304acee105e9243eb0d46e76059cd77014f0ce3feba16d97363e4d946-rootfs.mount: Deactivated successfully. May 13 08:38:26.358938 kubelet[1940]: E0513 08:38:26.358768 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wnsw4" podUID="14293fd4-c5b5-4b77-9cbd-af7d79ab2352" May 13 08:38:26.457445 env[1160]: time="2025-05-13T08:38:26.456231411Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 13 08:38:28.358803 kubelet[1940]: E0513 08:38:28.358732 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wnsw4" podUID="14293fd4-c5b5-4b77-9cbd-af7d79ab2352" May 13 08:38:30.358510 kubelet[1940]: E0513 08:38:30.357981 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wnsw4" podUID="14293fd4-c5b5-4b77-9cbd-af7d79ab2352" May 13 08:38:32.358513 kubelet[1940]: E0513 08:38:32.357848 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wnsw4" podUID="14293fd4-c5b5-4b77-9cbd-af7d79ab2352" May 13 08:38:33.788235 env[1160]: time="2025-05-13T08:38:33.788073218Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:33.791409 env[1160]: time="2025-05-13T08:38:33.791387654Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:33.794731 env[1160]: time="2025-05-13T08:38:33.794686590Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:33.797554 env[1160]: time="2025-05-13T08:38:33.797521442Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:33.798955 env[1160]: time="2025-05-13T08:38:33.798894475Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 13 08:38:33.802240 env[1160]: time="2025-05-13T08:38:33.802207046Z" level=info msg="CreateContainer within sandbox \"638c67f0c9cfffb07f1098fcc8b28e3242f5410aeebfa0017f78f79884a61a3b\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 13 08:38:33.826910 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1774506423.mount: Deactivated successfully. May 13 08:38:33.834706 env[1160]: time="2025-05-13T08:38:33.834668601Z" level=info msg="CreateContainer within sandbox \"638c67f0c9cfffb07f1098fcc8b28e3242f5410aeebfa0017f78f79884a61a3b\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"13e5fdbc8dad3c1bc55fec4f35366729f33eb42e294533198c61a05ee55925cb\"" May 13 08:38:33.837291 env[1160]: time="2025-05-13T08:38:33.837265336Z" level=info msg="StartContainer for \"13e5fdbc8dad3c1bc55fec4f35366729f33eb42e294533198c61a05ee55925cb\"" May 13 08:38:33.881095 systemd[1]: Started cri-containerd-13e5fdbc8dad3c1bc55fec4f35366729f33eb42e294533198c61a05ee55925cb.scope. May 13 08:38:33.922914 kernel: kauditd_printk_skb: 91 callbacks suppressed May 13 08:38:33.923097 kernel: audit: type=1400 audit(1747125513.909:933): avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.923135 kernel: audit: type=1300 audit(1747125513.909:933): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fc85654a7b8 items=0 ppid=2383 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:33.909000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.909000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fc85654a7b8 items=0 ppid=2383 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:33.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133653566646263386461643363316263353566656334663335333636 May 13 08:38:33.910000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.934622 kernel: audit: type=1327 audit(1747125513.909:933): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133653566646263386461643363316263353566656334663335333636 May 13 08:38:33.934669 kernel: audit: type=1400 audit(1747125513.910:934): avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.934693 kernel: audit: type=1400 audit(1747125513.910:934): avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.910000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.910000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.943454 kernel: audit: type=1400 audit(1747125513.910:934): avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.910000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.910000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.953104 kernel: audit: type=1400 audit(1747125513.910:934): avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.953166 kernel: audit: type=1400 audit(1747125513.910:934): avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.910000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.959253 kernel: audit: type=1400 audit(1747125513.910:934): avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.910000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.910000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.910000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.969828 kernel: audit: type=1400 audit(1747125513.910:934): avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.910000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.910000 audit: BPF prog-id=136 op=LOAD May 13 08:38:33.910000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00030ecf8 items=0 ppid=2383 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:33.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133653566646263386461643363316263353566656334663335333636 May 13 08:38:33.915000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.915000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.915000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.915000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.915000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.915000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.915000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.915000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.915000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.915000 audit: BPF prog-id=137 op=LOAD May 13 08:38:33.915000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00030ed48 items=0 ppid=2383 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:33.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133653566646263386461643363316263353566656334663335333636 May 13 08:38:33.922000 audit: BPF prog-id=137 op=UNLOAD May 13 08:38:33.922000 audit: BPF prog-id=136 op=UNLOAD May 13 08:38:33.922000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.922000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.922000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.922000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.922000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.922000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.922000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.922000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.922000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.922000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:33.922000 audit: BPF prog-id=138 op=LOAD May 13 08:38:33.922000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00030edd8 items=0 ppid=2383 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:33.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133653566646263386461643363316263353566656334663335333636 May 13 08:38:33.972954 env[1160]: time="2025-05-13T08:38:33.972914841Z" level=info msg="StartContainer for \"13e5fdbc8dad3c1bc55fec4f35366729f33eb42e294533198c61a05ee55925cb\" returns successfully" May 13 08:38:34.359310 kubelet[1940]: E0513 08:38:34.359225 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wnsw4" podUID="14293fd4-c5b5-4b77-9cbd-af7d79ab2352" May 13 08:38:35.227802 env[1160]: time="2025-05-13T08:38:35.227686442Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 08:38:35.232402 systemd[1]: cri-containerd-13e5fdbc8dad3c1bc55fec4f35366729f33eb42e294533198c61a05ee55925cb.scope: Deactivated successfully. May 13 08:38:35.235000 audit: BPF prog-id=138 op=UNLOAD May 13 08:38:35.246675 kubelet[1940]: I0513 08:38:35.246299 1940 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 13 08:38:35.282602 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-13e5fdbc8dad3c1bc55fec4f35366729f33eb42e294533198c61a05ee55925cb-rootfs.mount: Deactivated successfully. May 13 08:38:35.550426 systemd[1]: Created slice kubepods-burstable-podbb10d67c_f538_43e5_815f_31e6361dc87a.slice. May 13 08:38:35.583443 systemd[1]: Created slice kubepods-burstable-podad79d4a2_2f47_4184_9900_a632651cccb9.slice. May 13 08:38:35.623452 systemd[1]: Created slice kubepods-besteffort-podee88de73_bb38_4d28_8c79_de16aa79a964.slice. May 13 08:38:35.628538 systemd[1]: Created slice kubepods-besteffort-pod1770c4b6_19bf_4e86_b869_5eebd27cd9cc.slice. May 13 08:38:35.632901 systemd[1]: Created slice kubepods-besteffort-pod1d7a9809_d4eb_451a_ba79_1d943bd8bb27.slice. May 13 08:38:35.681123 kubelet[1940]: I0513 08:38:35.681089 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/bb10d67c-f538-43e5-815f-31e6361dc87a-config-volume\") pod \"coredns-6f6b679f8f-879wp\" (UID: \"bb10d67c-f538-43e5-815f-31e6361dc87a\") " pod="kube-system/coredns-6f6b679f8f-879wp" May 13 08:38:35.681732 kubelet[1940]: I0513 08:38:35.681711 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jcckc\" (UniqueName: \"kubernetes.io/projected/bb10d67c-f538-43e5-815f-31e6361dc87a-kube-api-access-jcckc\") pod \"coredns-6f6b679f8f-879wp\" (UID: \"bb10d67c-f538-43e5-815f-31e6361dc87a\") " pod="kube-system/coredns-6f6b679f8f-879wp" May 13 08:38:35.681827 kubelet[1940]: I0513 08:38:35.681812 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/ad79d4a2-2f47-4184-9900-a632651cccb9-config-volume\") pod \"coredns-6f6b679f8f-frqhd\" (UID: \"ad79d4a2-2f47-4184-9900-a632651cccb9\") " pod="kube-system/coredns-6f6b679f8f-frqhd" May 13 08:38:35.681923 kubelet[1940]: I0513 08:38:35.681908 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xl5ng\" (UniqueName: \"kubernetes.io/projected/ad79d4a2-2f47-4184-9900-a632651cccb9-kube-api-access-xl5ng\") pod \"coredns-6f6b679f8f-frqhd\" (UID: \"ad79d4a2-2f47-4184-9900-a632651cccb9\") " pod="kube-system/coredns-6f6b679f8f-frqhd" May 13 08:38:35.782459 kubelet[1940]: I0513 08:38:35.782361 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ee88de73-bb38-4d28-8c79-de16aa79a964-tigera-ca-bundle\") pod \"calico-kube-controllers-7685b4f9bb-gqlkt\" (UID: \"ee88de73-bb38-4d28-8c79-de16aa79a964\") " pod="calico-system/calico-kube-controllers-7685b4f9bb-gqlkt" May 13 08:38:35.782746 kubelet[1940]: I0513 08:38:35.782535 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j7xmk\" (UniqueName: \"kubernetes.io/projected/ee88de73-bb38-4d28-8c79-de16aa79a964-kube-api-access-j7xmk\") pod \"calico-kube-controllers-7685b4f9bb-gqlkt\" (UID: \"ee88de73-bb38-4d28-8c79-de16aa79a964\") " pod="calico-system/calico-kube-controllers-7685b4f9bb-gqlkt" May 13 08:38:35.782746 kubelet[1940]: I0513 08:38:35.782670 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/1770c4b6-19bf-4e86-b869-5eebd27cd9cc-calico-apiserver-certs\") pod \"calico-apiserver-6dc689f579-hm7sz\" (UID: \"1770c4b6-19bf-4e86-b869-5eebd27cd9cc\") " pod="calico-apiserver/calico-apiserver-6dc689f579-hm7sz" May 13 08:38:35.782939 kubelet[1940]: I0513 08:38:35.782759 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7k5j7\" (UniqueName: \"kubernetes.io/projected/1d7a9809-d4eb-451a-ba79-1d943bd8bb27-kube-api-access-7k5j7\") pod \"calico-apiserver-6dc689f579-kgtzs\" (UID: \"1d7a9809-d4eb-451a-ba79-1d943bd8bb27\") " pod="calico-apiserver/calico-apiserver-6dc689f579-kgtzs" May 13 08:38:35.782939 kubelet[1940]: I0513 08:38:35.782851 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/1d7a9809-d4eb-451a-ba79-1d943bd8bb27-calico-apiserver-certs\") pod \"calico-apiserver-6dc689f579-kgtzs\" (UID: \"1d7a9809-d4eb-451a-ba79-1d943bd8bb27\") " pod="calico-apiserver/calico-apiserver-6dc689f579-kgtzs" May 13 08:38:35.783140 kubelet[1940]: I0513 08:38:35.782941 1940 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dpd2g\" (UniqueName: \"kubernetes.io/projected/1770c4b6-19bf-4e86-b869-5eebd27cd9cc-kube-api-access-dpd2g\") pod \"calico-apiserver-6dc689f579-hm7sz\" (UID: \"1770c4b6-19bf-4e86-b869-5eebd27cd9cc\") " pod="calico-apiserver/calico-apiserver-6dc689f579-hm7sz" May 13 08:38:36.150191 env[1160]: time="2025-05-13T08:38:36.149949641Z" level=info msg="shim disconnected" id=13e5fdbc8dad3c1bc55fec4f35366729f33eb42e294533198c61a05ee55925cb May 13 08:38:36.150191 env[1160]: time="2025-05-13T08:38:36.149995758Z" level=warning msg="cleaning up after shim disconnected" id=13e5fdbc8dad3c1bc55fec4f35366729f33eb42e294533198c61a05ee55925cb namespace=k8s.io May 13 08:38:36.150191 env[1160]: time="2025-05-13T08:38:36.150006237Z" level=info msg="cleaning up dead shim" May 13 08:38:36.162045 env[1160]: time="2025-05-13T08:38:36.162006139Z" level=warning msg="cleanup warnings time=\"2025-05-13T08:38:36Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2648 runtime=io.containerd.runc.v2\n" May 13 08:38:36.178336 env[1160]: time="2025-05-13T08:38:36.178299283Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-879wp,Uid:bb10d67c-f538-43e5-815f-31e6361dc87a,Namespace:kube-system,Attempt:0,}" May 13 08:38:36.219428 env[1160]: time="2025-05-13T08:38:36.219391742Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-frqhd,Uid:ad79d4a2-2f47-4184-9900-a632651cccb9,Namespace:kube-system,Attempt:0,}" May 13 08:38:36.227289 env[1160]: time="2025-05-13T08:38:36.227250338Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7685b4f9bb-gqlkt,Uid:ee88de73-bb38-4d28-8c79-de16aa79a964,Namespace:calico-system,Attempt:0,}" May 13 08:38:36.232332 env[1160]: time="2025-05-13T08:38:36.232299561Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6dc689f579-hm7sz,Uid:1770c4b6-19bf-4e86-b869-5eebd27cd9cc,Namespace:calico-apiserver,Attempt:0,}" May 13 08:38:36.235968 env[1160]: time="2025-05-13T08:38:36.235938232Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6dc689f579-kgtzs,Uid:1d7a9809-d4eb-451a-ba79-1d943bd8bb27,Namespace:calico-apiserver,Attempt:0,}" May 13 08:38:36.260980 env[1160]: time="2025-05-13T08:38:36.260919610Z" level=error msg="Failed to destroy network for sandbox \"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.262121 env[1160]: time="2025-05-13T08:38:36.262016613Z" level=error msg="encountered an error cleaning up failed sandbox \"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.262216 env[1160]: time="2025-05-13T08:38:36.262134886Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-879wp,Uid:bb10d67c-f538-43e5-815f-31e6361dc87a,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.262977 kubelet[1940]: E0513 08:38:36.262426 1940 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.262977 kubelet[1940]: E0513 08:38:36.262564 1940 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-879wp" May 13 08:38:36.262977 kubelet[1940]: E0513 08:38:36.262600 1940 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-879wp" May 13 08:38:36.263109 kubelet[1940]: E0513 08:38:36.262648 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-879wp_kube-system(bb10d67c-f538-43e5-815f-31e6361dc87a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-879wp_kube-system(bb10d67c-f538-43e5-815f-31e6361dc87a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-879wp" podUID="bb10d67c-f538-43e5-815f-31e6361dc87a" May 13 08:38:36.363847 systemd[1]: Created slice kubepods-besteffort-pod14293fd4_c5b5_4b77_9cbd_af7d79ab2352.slice. May 13 08:38:36.371966 env[1160]: time="2025-05-13T08:38:36.371923494Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wnsw4,Uid:14293fd4-c5b5-4b77-9cbd-af7d79ab2352,Namespace:calico-system,Attempt:0,}" May 13 08:38:36.431986 env[1160]: time="2025-05-13T08:38:36.429323194Z" level=error msg="Failed to destroy network for sandbox \"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.431747 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5-shm.mount: Deactivated successfully. May 13 08:38:36.433254 env[1160]: time="2025-05-13T08:38:36.433181568Z" level=error msg="encountered an error cleaning up failed sandbox \"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.433458 env[1160]: time="2025-05-13T08:38:36.433406291Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-frqhd,Uid:ad79d4a2-2f47-4184-9900-a632651cccb9,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.436212 kubelet[1940]: E0513 08:38:36.435200 1940 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.436212 kubelet[1940]: E0513 08:38:36.435264 1940 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-frqhd" May 13 08:38:36.436212 kubelet[1940]: E0513 08:38:36.435287 1940 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-frqhd" May 13 08:38:36.436388 kubelet[1940]: E0513 08:38:36.435345 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-frqhd_kube-system(ad79d4a2-2f47-4184-9900-a632651cccb9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-frqhd_kube-system(ad79d4a2-2f47-4184-9900-a632651cccb9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-frqhd" podUID="ad79d4a2-2f47-4184-9900-a632651cccb9" May 13 08:38:36.466992 env[1160]: time="2025-05-13T08:38:36.466918098Z" level=error msg="Failed to destroy network for sandbox \"49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.467708 env[1160]: time="2025-05-13T08:38:36.467641638Z" level=error msg="encountered an error cleaning up failed sandbox \"49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.467853 env[1160]: time="2025-05-13T08:38:36.467822819Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6dc689f579-kgtzs,Uid:1d7a9809-d4eb-451a-ba79-1d943bd8bb27,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.468211 kubelet[1940]: E0513 08:38:36.468169 1940 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.468292 kubelet[1940]: E0513 08:38:36.468233 1940 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6dc689f579-kgtzs" May 13 08:38:36.468292 kubelet[1940]: E0513 08:38:36.468255 1940 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6dc689f579-kgtzs" May 13 08:38:36.468366 kubelet[1940]: E0513 08:38:36.468300 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6dc689f579-kgtzs_calico-apiserver(1d7a9809-d4eb-451a-ba79-1d943bd8bb27)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6dc689f579-kgtzs_calico-apiserver(1d7a9809-d4eb-451a-ba79-1d943bd8bb27)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6dc689f579-kgtzs" podUID="1d7a9809-d4eb-451a-ba79-1d943bd8bb27" May 13 08:38:36.470168 env[1160]: time="2025-05-13T08:38:36.470134054Z" level=error msg="Failed to destroy network for sandbox \"c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.470734 env[1160]: time="2025-05-13T08:38:36.470702473Z" level=error msg="encountered an error cleaning up failed sandbox \"c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.470859 env[1160]: time="2025-05-13T08:38:36.470827788Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7685b4f9bb-gqlkt,Uid:ee88de73-bb38-4d28-8c79-de16aa79a964,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.471377 kubelet[1940]: E0513 08:38:36.471147 1940 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.471377 kubelet[1940]: E0513 08:38:36.471206 1940 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7685b4f9bb-gqlkt" May 13 08:38:36.471377 kubelet[1940]: E0513 08:38:36.471251 1940 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7685b4f9bb-gqlkt" May 13 08:38:36.471974 kubelet[1940]: E0513 08:38:36.471332 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7685b4f9bb-gqlkt_calico-system(ee88de73-bb38-4d28-8c79-de16aa79a964)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7685b4f9bb-gqlkt_calico-system(ee88de73-bb38-4d28-8c79-de16aa79a964)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7685b4f9bb-gqlkt" podUID="ee88de73-bb38-4d28-8c79-de16aa79a964" May 13 08:38:36.477783 kubelet[1940]: I0513 08:38:36.477758 1940 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" May 13 08:38:36.479194 env[1160]: time="2025-05-13T08:38:36.478742620Z" level=info msg="StopPodSandbox for \"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\"" May 13 08:38:36.480384 kubelet[1940]: I0513 08:38:36.480361 1940 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" May 13 08:38:36.481287 env[1160]: time="2025-05-13T08:38:36.481258510Z" level=info msg="StopPodSandbox for \"c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae\"" May 13 08:38:36.482558 kubelet[1940]: I0513 08:38:36.482533 1940 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" May 13 08:38:36.483693 env[1160]: time="2025-05-13T08:38:36.483655737Z" level=info msg="StopPodSandbox for \"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\"" May 13 08:38:36.486012 kubelet[1940]: I0513 08:38:36.485981 1940 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" May 13 08:38:36.486469 env[1160]: time="2025-05-13T08:38:36.486429592Z" level=info msg="StopPodSandbox for \"49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821\"" May 13 08:38:36.497885 env[1160]: time="2025-05-13T08:38:36.497805641Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 13 08:38:36.525307 env[1160]: time="2025-05-13T08:38:36.525250782Z" level=error msg="Failed to destroy network for sandbox \"b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.525641 env[1160]: time="2025-05-13T08:38:36.525604256Z" level=error msg="encountered an error cleaning up failed sandbox \"b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.525704 env[1160]: time="2025-05-13T08:38:36.525657476Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6dc689f579-hm7sz,Uid:1770c4b6-19bf-4e86-b869-5eebd27cd9cc,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.525874 kubelet[1940]: E0513 08:38:36.525841 1940 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.525941 kubelet[1940]: E0513 08:38:36.525899 1940 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6dc689f579-hm7sz" May 13 08:38:36.525941 kubelet[1940]: E0513 08:38:36.525921 1940 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6dc689f579-hm7sz" May 13 08:38:36.526017 kubelet[1940]: E0513 08:38:36.525975 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6dc689f579-hm7sz_calico-apiserver(1770c4b6-19bf-4e86-b869-5eebd27cd9cc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6dc689f579-hm7sz_calico-apiserver(1770c4b6-19bf-4e86-b869-5eebd27cd9cc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6dc689f579-hm7sz" podUID="1770c4b6-19bf-4e86-b869-5eebd27cd9cc" May 13 08:38:36.555620 env[1160]: time="2025-05-13T08:38:36.555570768Z" level=error msg="Failed to destroy network for sandbox \"981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.556070 env[1160]: time="2025-05-13T08:38:36.556040351Z" level=error msg="encountered an error cleaning up failed sandbox \"981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.556247 env[1160]: time="2025-05-13T08:38:36.556217314Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wnsw4,Uid:14293fd4-c5b5-4b77-9cbd-af7d79ab2352,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.556963 kubelet[1940]: E0513 08:38:36.556510 1940 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.556963 kubelet[1940]: E0513 08:38:36.556579 1940 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wnsw4" May 13 08:38:36.556963 kubelet[1940]: E0513 08:38:36.556606 1940 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wnsw4" May 13 08:38:36.557136 kubelet[1940]: E0513 08:38:36.556663 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-wnsw4_calico-system(14293fd4-c5b5-4b77-9cbd-af7d79ab2352)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-wnsw4_calico-system(14293fd4-c5b5-4b77-9cbd-af7d79ab2352)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wnsw4" podUID="14293fd4-c5b5-4b77-9cbd-af7d79ab2352" May 13 08:38:36.604454 env[1160]: time="2025-05-13T08:38:36.604393492Z" level=error msg="StopPodSandbox for \"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\" failed" error="failed to destroy network for sandbox \"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.604997 kubelet[1940]: E0513 08:38:36.604766 1940 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" May 13 08:38:36.604997 kubelet[1940]: E0513 08:38:36.604838 1940 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5"} May 13 08:38:36.604997 kubelet[1940]: E0513 08:38:36.604922 1940 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ad79d4a2-2f47-4184-9900-a632651cccb9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 08:38:36.604997 kubelet[1940]: E0513 08:38:36.604950 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ad79d4a2-2f47-4184-9900-a632651cccb9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-frqhd" podUID="ad79d4a2-2f47-4184-9900-a632651cccb9" May 13 08:38:36.607609 env[1160]: time="2025-05-13T08:38:36.607571006Z" level=error msg="StopPodSandbox for \"49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821\" failed" error="failed to destroy network for sandbox \"49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.607867 kubelet[1940]: E0513 08:38:36.607727 1940 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" May 13 08:38:36.607867 kubelet[1940]: E0513 08:38:36.607778 1940 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821"} May 13 08:38:36.607867 kubelet[1940]: E0513 08:38:36.607806 1940 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1d7a9809-d4eb-451a-ba79-1d943bd8bb27\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 08:38:36.607867 kubelet[1940]: E0513 08:38:36.607827 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1d7a9809-d4eb-451a-ba79-1d943bd8bb27\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6dc689f579-kgtzs" podUID="1d7a9809-d4eb-451a-ba79-1d943bd8bb27" May 13 08:38:36.616850 env[1160]: time="2025-05-13T08:38:36.616794337Z" level=error msg="StopPodSandbox for \"c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae\" failed" error="failed to destroy network for sandbox \"c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.617016 kubelet[1940]: E0513 08:38:36.616980 1940 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" May 13 08:38:36.617080 kubelet[1940]: E0513 08:38:36.617029 1940 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae"} May 13 08:38:36.617080 kubelet[1940]: E0513 08:38:36.617064 1940 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ee88de73-bb38-4d28-8c79-de16aa79a964\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 08:38:36.617172 kubelet[1940]: E0513 08:38:36.617109 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ee88de73-bb38-4d28-8c79-de16aa79a964\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7685b4f9bb-gqlkt" podUID="ee88de73-bb38-4d28-8c79-de16aa79a964" May 13 08:38:36.619743 env[1160]: time="2025-05-13T08:38:36.619700290Z" level=error msg="StopPodSandbox for \"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\" failed" error="failed to destroy network for sandbox \"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:36.620119 kubelet[1940]: E0513 08:38:36.619937 1940 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" May 13 08:38:36.620119 kubelet[1940]: E0513 08:38:36.619984 1940 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2"} May 13 08:38:36.620119 kubelet[1940]: E0513 08:38:36.620037 1940 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bb10d67c-f538-43e5-815f-31e6361dc87a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 08:38:36.620119 kubelet[1940]: E0513 08:38:36.620074 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bb10d67c-f538-43e5-815f-31e6361dc87a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-879wp" podUID="bb10d67c-f538-43e5-815f-31e6361dc87a" May 13 08:38:37.286016 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3-shm.mount: Deactivated successfully. May 13 08:38:37.286252 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8-shm.mount: Deactivated successfully. May 13 08:38:37.286405 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae-shm.mount: Deactivated successfully. May 13 08:38:37.286587 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821-shm.mount: Deactivated successfully. May 13 08:38:37.501864 kubelet[1940]: I0513 08:38:37.501795 1940 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" May 13 08:38:37.503225 env[1160]: time="2025-05-13T08:38:37.503163835Z" level=info msg="StopPodSandbox for \"b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8\"" May 13 08:38:37.507517 kubelet[1940]: I0513 08:38:37.507416 1940 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" May 13 08:38:37.509243 env[1160]: time="2025-05-13T08:38:37.509060870Z" level=info msg="StopPodSandbox for \"981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3\"" May 13 08:38:37.588290 env[1160]: time="2025-05-13T08:38:37.588165536Z" level=error msg="StopPodSandbox for \"b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8\" failed" error="failed to destroy network for sandbox \"b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:37.589018 kubelet[1940]: E0513 08:38:37.588980 1940 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" May 13 08:38:37.589093 kubelet[1940]: E0513 08:38:37.589046 1940 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8"} May 13 08:38:37.589093 kubelet[1940]: E0513 08:38:37.589084 1940 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1770c4b6-19bf-4e86-b869-5eebd27cd9cc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 08:38:37.589195 kubelet[1940]: E0513 08:38:37.589131 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1770c4b6-19bf-4e86-b869-5eebd27cd9cc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6dc689f579-hm7sz" podUID="1770c4b6-19bf-4e86-b869-5eebd27cd9cc" May 13 08:38:37.590593 env[1160]: time="2025-05-13T08:38:37.590556049Z" level=error msg="StopPodSandbox for \"981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3\" failed" error="failed to destroy network for sandbox \"981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:37.590911 kubelet[1940]: E0513 08:38:37.590768 1940 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" May 13 08:38:37.590911 kubelet[1940]: E0513 08:38:37.590819 1940 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3"} May 13 08:38:37.590911 kubelet[1940]: E0513 08:38:37.590858 1940 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"14293fd4-c5b5-4b77-9cbd-af7d79ab2352\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 08:38:37.590911 kubelet[1940]: E0513 08:38:37.590884 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"14293fd4-c5b5-4b77-9cbd-af7d79ab2352\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wnsw4" podUID="14293fd4-c5b5-4b77-9cbd-af7d79ab2352" May 13 08:38:43.071290 kubelet[1940]: I0513 08:38:43.071232 1940 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 08:38:43.156000 audit[2977]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2977 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:38:43.159617 kernel: kauditd_printk_skb: 34 callbacks suppressed May 13 08:38:43.159678 kernel: audit: type=1325 audit(1747125523.156:940): table=filter:95 family=2 entries=17 op=nft_register_rule pid=2977 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:38:43.156000 audit[2977]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff0d0cfb10 a2=0 a3=7fff0d0cfafc items=0 ppid=2066 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:43.170420 kernel: audit: type=1300 audit(1747125523.156:940): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff0d0cfb10 a2=0 a3=7fff0d0cfafc items=0 ppid=2066 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:43.156000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:38:43.174523 kernel: audit: type=1327 audit(1747125523.156:940): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:38:43.173000 audit[2977]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2977 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:38:43.185859 kernel: audit: type=1325 audit(1747125523.173:941): table=nat:96 family=2 entries=19 op=nft_register_chain pid=2977 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:38:43.185917 kernel: audit: type=1300 audit(1747125523.173:941): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff0d0cfb10 a2=0 a3=7fff0d0cfafc items=0 ppid=2066 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:43.173000 audit[2977]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff0d0cfb10 a2=0 a3=7fff0d0cfafc items=0 ppid=2066 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:43.189617 kernel: audit: type=1327 audit(1747125523.173:941): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:38:43.173000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:38:47.359894 env[1160]: time="2025-05-13T08:38:47.359015891Z" level=info msg="StopPodSandbox for \"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\"" May 13 08:38:47.372356 env[1160]: time="2025-05-13T08:38:47.371927790Z" level=info msg="StopPodSandbox for \"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\"" May 13 08:38:47.449957 env[1160]: time="2025-05-13T08:38:47.449825900Z" level=error msg="StopPodSandbox for \"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\" failed" error="failed to destroy network for sandbox \"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:47.450618 kubelet[1940]: E0513 08:38:47.450270 1940 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" May 13 08:38:47.450618 kubelet[1940]: E0513 08:38:47.450415 1940 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5"} May 13 08:38:47.450618 kubelet[1940]: E0513 08:38:47.450530 1940 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ad79d4a2-2f47-4184-9900-a632651cccb9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 08:38:47.450618 kubelet[1940]: E0513 08:38:47.450564 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ad79d4a2-2f47-4184-9900-a632651cccb9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-frqhd" podUID="ad79d4a2-2f47-4184-9900-a632651cccb9" May 13 08:38:47.473215 env[1160]: time="2025-05-13T08:38:47.473161130Z" level=error msg="StopPodSandbox for \"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\" failed" error="failed to destroy network for sandbox \"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:38:47.473697 kubelet[1940]: E0513 08:38:47.473523 1940 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" May 13 08:38:47.473697 kubelet[1940]: E0513 08:38:47.473562 1940 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2"} May 13 08:38:47.473697 kubelet[1940]: E0513 08:38:47.473625 1940 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bb10d67c-f538-43e5-815f-31e6361dc87a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 08:38:47.473697 kubelet[1940]: E0513 08:38:47.473654 1940 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bb10d67c-f538-43e5-815f-31e6361dc87a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-879wp" podUID="bb10d67c-f538-43e5-815f-31e6361dc87a" May 13 08:38:47.724667 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1122929976.mount: Deactivated successfully. May 13 08:38:47.758434 env[1160]: time="2025-05-13T08:38:47.758360878Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:47.760813 env[1160]: time="2025-05-13T08:38:47.760756021Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:47.762778 env[1160]: time="2025-05-13T08:38:47.762749225Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:47.765203 env[1160]: time="2025-05-13T08:38:47.765182129Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:47.765956 env[1160]: time="2025-05-13T08:38:47.765931844Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 13 08:38:47.787999 env[1160]: time="2025-05-13T08:38:47.787962520Z" level=info msg="CreateContainer within sandbox \"638c67f0c9cfffb07f1098fcc8b28e3242f5410aeebfa0017f78f79884a61a3b\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 13 08:38:47.820620 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount222839244.mount: Deactivated successfully. May 13 08:38:47.828548 env[1160]: time="2025-05-13T08:38:47.828426992Z" level=info msg="CreateContainer within sandbox \"638c67f0c9cfffb07f1098fcc8b28e3242f5410aeebfa0017f78f79884a61a3b\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"330ff46edc8b367c3954a29016aa2b66a3bef771202384c5641f8b80ded0ecc1\"" May 13 08:38:47.830334 env[1160]: time="2025-05-13T08:38:47.830188057Z" level=info msg="StartContainer for \"330ff46edc8b367c3954a29016aa2b66a3bef771202384c5641f8b80ded0ecc1\"" May 13 08:38:47.851670 systemd[1]: Started cri-containerd-330ff46edc8b367c3954a29016aa2b66a3bef771202384c5641f8b80ded0ecc1.scope. May 13 08:38:47.873000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.873000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f58a5010c28 items=0 ppid=2383 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:47.886683 kernel: audit: type=1400 audit(1747125527.873:942): avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.886735 kernel: audit: type=1300 audit(1747125527.873:942): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f58a5010c28 items=0 ppid=2383 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:47.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333306666343665646338623336376333393534613239303136616132 May 13 08:38:47.894580 kernel: audit: type=1327 audit(1747125527.873:942): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333306666343665646338623336376333393534613239303136616132 May 13 08:38:47.873000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.873000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.873000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.873000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.873000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.873000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.873000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.873000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.900521 kernel: audit: type=1400 audit(1747125527.873:943): avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.873000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.873000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.873000 audit: BPF prog-id=139 op=LOAD May 13 08:38:47.873000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b6a18 items=0 ppid=2383 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:47.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333306666343665646338623336376333393534613239303136616132 May 13 08:38:47.885000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.885000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.885000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.885000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.885000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.885000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.885000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.885000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.885000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.885000 audit: BPF prog-id=140 op=LOAD May 13 08:38:47.885000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b6a68 items=0 ppid=2383 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:47.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333306666343665646338623336376333393534613239303136616132 May 13 08:38:47.885000 audit: BPF prog-id=140 op=UNLOAD May 13 08:38:47.885000 audit: BPF prog-id=139 op=UNLOAD May 13 08:38:47.885000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.885000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.885000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.885000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.885000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.885000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.885000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.885000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.885000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.885000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:47.885000 audit: BPF prog-id=141 op=LOAD May 13 08:38:47.885000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b6af8 items=0 ppid=2383 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:47.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333306666343665646338623336376333393534613239303136616132 May 13 08:38:47.915464 env[1160]: time="2025-05-13T08:38:47.915415476Z" level=info msg="StartContainer for \"330ff46edc8b367c3954a29016aa2b66a3bef771202384c5641f8b80ded0ecc1\" returns successfully" May 13 08:38:47.996809 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 13 08:38:47.996917 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 13 08:38:48.359070 env[1160]: time="2025-05-13T08:38:48.359013543Z" level=info msg="StopPodSandbox for \"b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8\"" May 13 08:38:48.359574 env[1160]: time="2025-05-13T08:38:48.359350090Z" level=info msg="StopPodSandbox for \"49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821\"" May 13 08:38:48.359686 env[1160]: time="2025-05-13T08:38:48.359645176Z" level=info msg="StopPodSandbox for \"c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae\"" May 13 08:38:48.539622 env[1160]: 2025-05-13 08:38:48.476 [INFO][3110] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" May 13 08:38:48.539622 env[1160]: 2025-05-13 08:38:48.476 [INFO][3110] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" iface="eth0" netns="/var/run/netns/cni-15c9d0ae-36dd-cc72-1083-960f9aa3f830" May 13 08:38:48.539622 env[1160]: 2025-05-13 08:38:48.476 [INFO][3110] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" iface="eth0" netns="/var/run/netns/cni-15c9d0ae-36dd-cc72-1083-960f9aa3f830" May 13 08:38:48.539622 env[1160]: 2025-05-13 08:38:48.476 [INFO][3110] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" iface="eth0" netns="/var/run/netns/cni-15c9d0ae-36dd-cc72-1083-960f9aa3f830" May 13 08:38:48.539622 env[1160]: 2025-05-13 08:38:48.476 [INFO][3110] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" May 13 08:38:48.539622 env[1160]: 2025-05-13 08:38:48.476 [INFO][3110] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" May 13 08:38:48.539622 env[1160]: 2025-05-13 08:38:48.525 [INFO][3144] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" HandleID="k8s-pod-network.49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-eth0" May 13 08:38:48.539622 env[1160]: 2025-05-13 08:38:48.525 [INFO][3144] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:38:48.539622 env[1160]: 2025-05-13 08:38:48.525 [INFO][3144] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:38:48.539622 env[1160]: 2025-05-13 08:38:48.532 [WARNING][3144] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" HandleID="k8s-pod-network.49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-eth0" May 13 08:38:48.539622 env[1160]: 2025-05-13 08:38:48.532 [INFO][3144] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" HandleID="k8s-pod-network.49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-eth0" May 13 08:38:48.539622 env[1160]: 2025-05-13 08:38:48.534 [INFO][3144] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:38:48.539622 env[1160]: 2025-05-13 08:38:48.538 [INFO][3110] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" May 13 08:38:48.540315 env[1160]: time="2025-05-13T08:38:48.540167920Z" level=info msg="TearDown network for sandbox \"49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821\" successfully" May 13 08:38:48.540315 env[1160]: time="2025-05-13T08:38:48.540204730Z" level=info msg="StopPodSandbox for \"49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821\" returns successfully" May 13 08:38:48.540727 env[1160]: time="2025-05-13T08:38:48.540696388Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6dc689f579-kgtzs,Uid:1d7a9809-d4eb-451a-ba79-1d943bd8bb27,Namespace:calico-apiserver,Attempt:1,}" May 13 08:38:48.567443 kubelet[1940]: I0513 08:38:48.567384 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-kzxdb" podStartSLOduration=1.8545029990000002 podStartE2EDuration="30.567365834s" podCreationTimestamp="2025-05-13 08:38:18 +0000 UTC" firstStartedPulling="2025-05-13 08:38:19.054693777 +0000 UTC m=+13.007813458" lastFinishedPulling="2025-05-13 08:38:47.767556562 +0000 UTC m=+41.720676293" observedRunningTime="2025-05-13 08:38:48.567263741 +0000 UTC m=+42.520383432" watchObservedRunningTime="2025-05-13 08:38:48.567365834 +0000 UTC m=+42.520485515" May 13 08:38:48.576400 env[1160]: 2025-05-13 08:38:48.483 [INFO][3111] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" May 13 08:38:48.576400 env[1160]: 2025-05-13 08:38:48.483 [INFO][3111] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" iface="eth0" netns="/var/run/netns/cni-27d8cba0-b7e0-516b-1203-0d630bb1e18d" May 13 08:38:48.576400 env[1160]: 2025-05-13 08:38:48.484 [INFO][3111] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" iface="eth0" netns="/var/run/netns/cni-27d8cba0-b7e0-516b-1203-0d630bb1e18d" May 13 08:38:48.576400 env[1160]: 2025-05-13 08:38:48.484 [INFO][3111] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" iface="eth0" netns="/var/run/netns/cni-27d8cba0-b7e0-516b-1203-0d630bb1e18d" May 13 08:38:48.576400 env[1160]: 2025-05-13 08:38:48.484 [INFO][3111] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" May 13 08:38:48.576400 env[1160]: 2025-05-13 08:38:48.484 [INFO][3111] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" May 13 08:38:48.576400 env[1160]: 2025-05-13 08:38:48.546 [INFO][3150] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" HandleID="k8s-pod-network.c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-eth0" May 13 08:38:48.576400 env[1160]: 2025-05-13 08:38:48.546 [INFO][3150] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:38:48.576400 env[1160]: 2025-05-13 08:38:48.547 [INFO][3150] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:38:48.576400 env[1160]: 2025-05-13 08:38:48.568 [WARNING][3150] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" HandleID="k8s-pod-network.c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-eth0" May 13 08:38:48.576400 env[1160]: 2025-05-13 08:38:48.568 [INFO][3150] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" HandleID="k8s-pod-network.c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-eth0" May 13 08:38:48.576400 env[1160]: 2025-05-13 08:38:48.570 [INFO][3150] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:38:48.576400 env[1160]: 2025-05-13 08:38:48.572 [INFO][3111] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" May 13 08:38:48.577217 env[1160]: time="2025-05-13T08:38:48.577185771Z" level=info msg="TearDown network for sandbox \"c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae\" successfully" May 13 08:38:48.577334 env[1160]: time="2025-05-13T08:38:48.577309065Z" level=info msg="StopPodSandbox for \"c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae\" returns successfully" May 13 08:38:48.578259 env[1160]: time="2025-05-13T08:38:48.578223110Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7685b4f9bb-gqlkt,Uid:ee88de73-bb38-4d28-8c79-de16aa79a964,Namespace:calico-system,Attempt:1,}" May 13 08:38:48.593744 env[1160]: 2025-05-13 08:38:48.494 [INFO][3122] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" May 13 08:38:48.593744 env[1160]: 2025-05-13 08:38:48.494 [INFO][3122] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" iface="eth0" netns="/var/run/netns/cni-69351e26-d54f-7dba-4360-9216931b4beb" May 13 08:38:48.593744 env[1160]: 2025-05-13 08:38:48.494 [INFO][3122] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" iface="eth0" netns="/var/run/netns/cni-69351e26-d54f-7dba-4360-9216931b4beb" May 13 08:38:48.593744 env[1160]: 2025-05-13 08:38:48.494 [INFO][3122] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" iface="eth0" netns="/var/run/netns/cni-69351e26-d54f-7dba-4360-9216931b4beb" May 13 08:38:48.593744 env[1160]: 2025-05-13 08:38:48.495 [INFO][3122] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" May 13 08:38:48.593744 env[1160]: 2025-05-13 08:38:48.495 [INFO][3122] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" May 13 08:38:48.593744 env[1160]: 2025-05-13 08:38:48.560 [INFO][3152] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" HandleID="k8s-pod-network.b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-eth0" May 13 08:38:48.593744 env[1160]: 2025-05-13 08:38:48.561 [INFO][3152] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:38:48.593744 env[1160]: 2025-05-13 08:38:48.570 [INFO][3152] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:38:48.593744 env[1160]: 2025-05-13 08:38:48.588 [WARNING][3152] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" HandleID="k8s-pod-network.b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-eth0" May 13 08:38:48.593744 env[1160]: 2025-05-13 08:38:48.588 [INFO][3152] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" HandleID="k8s-pod-network.b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-eth0" May 13 08:38:48.593744 env[1160]: 2025-05-13 08:38:48.590 [INFO][3152] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:38:48.593744 env[1160]: 2025-05-13 08:38:48.592 [INFO][3122] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" May 13 08:38:48.594264 env[1160]: time="2025-05-13T08:38:48.593925983Z" level=info msg="TearDown network for sandbox \"b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8\" successfully" May 13 08:38:48.594264 env[1160]: time="2025-05-13T08:38:48.593954116Z" level=info msg="StopPodSandbox for \"b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8\" returns successfully" May 13 08:38:48.594906 env[1160]: time="2025-05-13T08:38:48.594873542Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6dc689f579-hm7sz,Uid:1770c4b6-19bf-4e86-b869-5eebd27cd9cc,Namespace:calico-apiserver,Attempt:1,}" May 13 08:38:48.727263 systemd[1]: run-netns-cni\x2d69351e26\x2dd54f\x2d7dba\x2d4360\x2d9216931b4beb.mount: Deactivated successfully. May 13 08:38:48.727346 systemd[1]: run-netns-cni\x2d27d8cba0\x2db7e0\x2d516b\x2d1203\x2d0d630bb1e18d.mount: Deactivated successfully. May 13 08:38:48.727402 systemd[1]: run-netns-cni\x2d15c9d0ae\x2d36dd\x2dcc72\x2d1083\x2d960f9aa3f830.mount: Deactivated successfully. May 13 08:38:48.865141 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 08:38:48.865233 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7b025663018: link becomes ready May 13 08:38:48.857952 systemd-networkd[993]: cali7b025663018: Link UP May 13 08:38:48.864978 systemd-networkd[993]: cali7b025663018: Gained carrier May 13 08:38:48.892034 env[1160]: 2025-05-13 08:38:48.652 [INFO][3183] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 13 08:38:48.892034 env[1160]: 2025-05-13 08:38:48.678 [INFO][3183] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-eth0 calico-kube-controllers-7685b4f9bb- calico-system ee88de73-bb38-4d28-8c79-de16aa79a964 781 0 2025-05-13 08:38:18 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7685b4f9bb projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-7-n-702ca96d1c.novalocal calico-kube-controllers-7685b4f9bb-gqlkt eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali7b025663018 [] []}} ContainerID="0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a" Namespace="calico-system" Pod="calico-kube-controllers-7685b4f9bb-gqlkt" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-" May 13 08:38:48.892034 env[1160]: 2025-05-13 08:38:48.678 [INFO][3183] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a" Namespace="calico-system" Pod="calico-kube-controllers-7685b4f9bb-gqlkt" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-eth0" May 13 08:38:48.892034 env[1160]: 2025-05-13 08:38:48.739 [INFO][3225] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a" HandleID="k8s-pod-network.0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-eth0" May 13 08:38:48.892034 env[1160]: 2025-05-13 08:38:48.753 [INFO][3225] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a" HandleID="k8s-pod-network.0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003128a0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-7-n-702ca96d1c.novalocal", "pod":"calico-kube-controllers-7685b4f9bb-gqlkt", "timestamp":"2025-05-13 08:38:48.739089688 +0000 UTC"}, Hostname:"ci-3510-3-7-n-702ca96d1c.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 08:38:48.892034 env[1160]: 2025-05-13 08:38:48.753 [INFO][3225] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:38:48.892034 env[1160]: 2025-05-13 08:38:48.753 [INFO][3225] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:38:48.892034 env[1160]: 2025-05-13 08:38:48.753 [INFO][3225] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-702ca96d1c.novalocal' May 13 08:38:48.892034 env[1160]: 2025-05-13 08:38:48.757 [INFO][3225] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:48.892034 env[1160]: 2025-05-13 08:38:48.765 [INFO][3225] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:48.892034 env[1160]: 2025-05-13 08:38:48.795 [INFO][3225] ipam/ipam.go 489: Trying affinity for 192.168.120.192/26 host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:48.892034 env[1160]: 2025-05-13 08:38:48.804 [INFO][3225] ipam/ipam.go 155: Attempting to load block cidr=192.168.120.192/26 host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:48.892034 env[1160]: 2025-05-13 08:38:48.807 [INFO][3225] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.120.192/26 host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:48.892034 env[1160]: 2025-05-13 08:38:48.807 [INFO][3225] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.120.192/26 handle="k8s-pod-network.0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:48.892034 env[1160]: 2025-05-13 08:38:48.815 [INFO][3225] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a May 13 08:38:48.892034 env[1160]: 2025-05-13 08:38:48.823 [INFO][3225] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.120.192/26 handle="k8s-pod-network.0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:48.892034 env[1160]: 2025-05-13 08:38:48.835 [INFO][3225] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.120.193/26] block=192.168.120.192/26 handle="k8s-pod-network.0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:48.892034 env[1160]: 2025-05-13 08:38:48.835 [INFO][3225] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.120.193/26] handle="k8s-pod-network.0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:48.892034 env[1160]: 2025-05-13 08:38:48.835 [INFO][3225] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:38:48.892034 env[1160]: 2025-05-13 08:38:48.835 [INFO][3225] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.120.193/26] IPv6=[] ContainerID="0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a" HandleID="k8s-pod-network.0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-eth0" May 13 08:38:48.892733 env[1160]: 2025-05-13 08:38:48.840 [INFO][3183] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a" Namespace="calico-system" Pod="calico-kube-controllers-7685b4f9bb-gqlkt" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-eth0", GenerateName:"calico-kube-controllers-7685b4f9bb-", Namespace:"calico-system", SelfLink:"", UID:"ee88de73-bb38-4d28-8c79-de16aa79a964", ResourceVersion:"781", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 38, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7685b4f9bb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-702ca96d1c.novalocal", ContainerID:"", Pod:"calico-kube-controllers-7685b4f9bb-gqlkt", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.120.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7b025663018", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:38:48.892733 env[1160]: 2025-05-13 08:38:48.840 [INFO][3183] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.120.193/32] ContainerID="0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a" Namespace="calico-system" Pod="calico-kube-controllers-7685b4f9bb-gqlkt" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-eth0" May 13 08:38:48.892733 env[1160]: 2025-05-13 08:38:48.840 [INFO][3183] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7b025663018 ContainerID="0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a" Namespace="calico-system" Pod="calico-kube-controllers-7685b4f9bb-gqlkt" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-eth0" May 13 08:38:48.892733 env[1160]: 2025-05-13 08:38:48.859 [INFO][3183] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a" Namespace="calico-system" Pod="calico-kube-controllers-7685b4f9bb-gqlkt" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-eth0" May 13 08:38:48.892733 env[1160]: 2025-05-13 08:38:48.870 [INFO][3183] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a" Namespace="calico-system" Pod="calico-kube-controllers-7685b4f9bb-gqlkt" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-eth0", GenerateName:"calico-kube-controllers-7685b4f9bb-", Namespace:"calico-system", SelfLink:"", UID:"ee88de73-bb38-4d28-8c79-de16aa79a964", ResourceVersion:"781", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 38, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7685b4f9bb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-702ca96d1c.novalocal", ContainerID:"0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a", Pod:"calico-kube-controllers-7685b4f9bb-gqlkt", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.120.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7b025663018", MAC:"6a:54:0a:2c:d7:4c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:38:48.892733 env[1160]: 2025-05-13 08:38:48.890 [INFO][3183] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a" Namespace="calico-system" Pod="calico-kube-controllers-7685b4f9bb-gqlkt" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-eth0" May 13 08:38:48.910846 env[1160]: time="2025-05-13T08:38:48.910730385Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 08:38:48.911098 env[1160]: time="2025-05-13T08:38:48.911072090Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 08:38:48.911224 env[1160]: time="2025-05-13T08:38:48.911200263Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 08:38:48.911624 env[1160]: time="2025-05-13T08:38:48.911593574Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a pid=3266 runtime=io.containerd.runc.v2 May 13 08:38:48.934726 systemd[1]: Started cri-containerd-0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a.scope. May 13 08:38:48.971429 systemd[1]: run-containerd-runc-k8s.io-0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a-runc.GdEnWk.mount: Deactivated successfully. May 13 08:38:49.012121 systemd-networkd[993]: cali3cfb0c4082d: Link UP May 13 08:38:49.016519 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3cfb0c4082d: link becomes ready May 13 08:38:49.016477 systemd-networkd[993]: cali3cfb0c4082d: Gained carrier May 13 08:38:49.038801 kernel: kauditd_printk_skb: 39 callbacks suppressed May 13 08:38:49.038927 kernel: audit: type=1400 audit(1747125529.031:948): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.046175 env[1160]: 2025-05-13 08:38:48.629 [INFO][3174] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 13 08:38:49.046175 env[1160]: 2025-05-13 08:38:48.647 [INFO][3174] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-eth0 calico-apiserver-6dc689f579- calico-apiserver 1d7a9809-d4eb-451a-ba79-1d943bd8bb27 780 0 2025-05-13 08:38:18 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6dc689f579 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-7-n-702ca96d1c.novalocal calico-apiserver-6dc689f579-kgtzs eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali3cfb0c4082d [] []}} ContainerID="d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805" Namespace="calico-apiserver" Pod="calico-apiserver-6dc689f579-kgtzs" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-" May 13 08:38:49.046175 env[1160]: 2025-05-13 08:38:48.647 [INFO][3174] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805" Namespace="calico-apiserver" Pod="calico-apiserver-6dc689f579-kgtzs" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-eth0" May 13 08:38:49.046175 env[1160]: 2025-05-13 08:38:48.772 [INFO][3219] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805" HandleID="k8s-pod-network.d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-eth0" May 13 08:38:49.046175 env[1160]: 2025-05-13 08:38:48.808 [INFO][3219] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805" HandleID="k8s-pod-network.d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031a810), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-7-n-702ca96d1c.novalocal", "pod":"calico-apiserver-6dc689f579-kgtzs", "timestamp":"2025-05-13 08:38:48.77252667 +0000 UTC"}, Hostname:"ci-3510-3-7-n-702ca96d1c.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 08:38:49.046175 env[1160]: 2025-05-13 08:38:48.808 [INFO][3219] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:38:49.046175 env[1160]: 2025-05-13 08:38:48.835 [INFO][3219] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:38:49.046175 env[1160]: 2025-05-13 08:38:48.835 [INFO][3219] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-702ca96d1c.novalocal' May 13 08:38:49.046175 env[1160]: 2025-05-13 08:38:48.871 [INFO][3219] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:49.046175 env[1160]: 2025-05-13 08:38:48.969 [INFO][3219] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:49.046175 env[1160]: 2025-05-13 08:38:48.979 [INFO][3219] ipam/ipam.go 489: Trying affinity for 192.168.120.192/26 host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:49.046175 env[1160]: 2025-05-13 08:38:48.982 [INFO][3219] ipam/ipam.go 155: Attempting to load block cidr=192.168.120.192/26 host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:49.046175 env[1160]: 2025-05-13 08:38:48.988 [INFO][3219] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.120.192/26 host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:49.046175 env[1160]: 2025-05-13 08:38:48.988 [INFO][3219] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.120.192/26 handle="k8s-pod-network.d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:49.046175 env[1160]: 2025-05-13 08:38:48.992 [INFO][3219] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805 May 13 08:38:49.046175 env[1160]: 2025-05-13 08:38:49.000 [INFO][3219] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.120.192/26 handle="k8s-pod-network.d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:49.046175 env[1160]: 2025-05-13 08:38:49.008 [INFO][3219] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.120.194/26] block=192.168.120.192/26 handle="k8s-pod-network.d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:49.046175 env[1160]: 2025-05-13 08:38:49.008 [INFO][3219] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.120.194/26] handle="k8s-pod-network.d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:49.046175 env[1160]: 2025-05-13 08:38:49.008 [INFO][3219] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:38:49.046175 env[1160]: 2025-05-13 08:38:49.008 [INFO][3219] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.120.194/26] IPv6=[] ContainerID="d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805" HandleID="k8s-pod-network.d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-eth0" May 13 08:38:49.046934 kernel: audit: type=1400 audit(1747125529.031:949): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.046966 env[1160]: 2025-05-13 08:38:49.010 [INFO][3174] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805" Namespace="calico-apiserver" Pod="calico-apiserver-6dc689f579-kgtzs" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-eth0", GenerateName:"calico-apiserver-6dc689f579-", Namespace:"calico-apiserver", SelfLink:"", UID:"1d7a9809-d4eb-451a-ba79-1d943bd8bb27", ResourceVersion:"780", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 38, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6dc689f579", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-702ca96d1c.novalocal", ContainerID:"", Pod:"calico-apiserver-6dc689f579-kgtzs", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.120.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3cfb0c4082d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:38:49.046966 env[1160]: 2025-05-13 08:38:49.010 [INFO][3174] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.120.194/32] ContainerID="d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805" Namespace="calico-apiserver" Pod="calico-apiserver-6dc689f579-kgtzs" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-eth0" May 13 08:38:49.046966 env[1160]: 2025-05-13 08:38:49.010 [INFO][3174] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3cfb0c4082d ContainerID="d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805" Namespace="calico-apiserver" Pod="calico-apiserver-6dc689f579-kgtzs" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-eth0" May 13 08:38:49.046966 env[1160]: 2025-05-13 08:38:49.014 [INFO][3174] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805" Namespace="calico-apiserver" Pod="calico-apiserver-6dc689f579-kgtzs" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-eth0" May 13 08:38:49.046966 env[1160]: 2025-05-13 08:38:49.021 [INFO][3174] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805" Namespace="calico-apiserver" Pod="calico-apiserver-6dc689f579-kgtzs" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-eth0", GenerateName:"calico-apiserver-6dc689f579-", Namespace:"calico-apiserver", SelfLink:"", UID:"1d7a9809-d4eb-451a-ba79-1d943bd8bb27", ResourceVersion:"780", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 38, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6dc689f579", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-702ca96d1c.novalocal", ContainerID:"d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805", Pod:"calico-apiserver-6dc689f579-kgtzs", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.120.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3cfb0c4082d", MAC:"d2:7d:4a:ce:6f:93", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:38:49.046966 env[1160]: 2025-05-13 08:38:49.035 [INFO][3174] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805" Namespace="calico-apiserver" Pod="calico-apiserver-6dc689f579-kgtzs" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-eth0" May 13 08:38:49.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.058799 kernel: audit: type=1400 audit(1747125529.031:950): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.058861 kernel: audit: type=1400 audit(1747125529.031:951): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.063783 kernel: audit: type=1400 audit(1747125529.031:952): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.068608 kernel: audit: type=1400 audit(1747125529.031:953): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.068731 env[1160]: time="2025-05-13T08:38:49.064076445Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 08:38:49.068731 env[1160]: time="2025-05-13T08:38:49.064150415Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 08:38:49.068731 env[1160]: time="2025-05-13T08:38:49.064179912Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 08:38:49.068731 env[1160]: time="2025-05-13T08:38:49.064311780Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805 pid=3312 runtime=io.containerd.runc.v2 May 13 08:38:49.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.079541 kernel: audit: type=1400 audit(1747125529.031:954): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.079596 kernel: audit: type=1400 audit(1747125529.031:955): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.084617 kernel: audit: type=1400 audit(1747125529.031:956): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.090000 kernel: audit: type=1400 audit(1747125529.033:957): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.033000 audit: BPF prog-id=142 op=LOAD May 13 08:38:49.038000 audit[3276]: AVC avc: denied { bpf } for pid=3276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3266 pid=3276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066333036303735356237623538353063356564306365393666613230 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { perfmon } for pid=3276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3266 pid=3276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066333036303735356237623538353063356564306365393666613230 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { bpf } for pid=3276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { bpf } for pid=3276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { bpf } for pid=3276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { perfmon } for pid=3276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { perfmon } for pid=3276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { perfmon } for pid=3276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { perfmon } for pid=3276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { perfmon } for pid=3276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { bpf } for pid=3276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { bpf } for pid=3276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit: BPF prog-id=143 op=LOAD May 13 08:38:49.038000 audit[3276]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000216350 items=0 ppid=3266 pid=3276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066333036303735356237623538353063356564306365393666613230 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { bpf } for pid=3276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { bpf } for pid=3276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { perfmon } for pid=3276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { perfmon } for pid=3276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { perfmon } for pid=3276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { perfmon } for pid=3276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { perfmon } for pid=3276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { bpf } for pid=3276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { bpf } for pid=3276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit: BPF prog-id=144 op=LOAD May 13 08:38:49.038000 audit[3276]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000216398 items=0 ppid=3266 pid=3276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066333036303735356237623538353063356564306365393666613230 May 13 08:38:49.038000 audit: BPF prog-id=144 op=UNLOAD May 13 08:38:49.038000 audit: BPF prog-id=143 op=UNLOAD May 13 08:38:49.038000 audit[3276]: AVC avc: denied { bpf } for pid=3276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { bpf } for pid=3276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { bpf } for pid=3276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { perfmon } for pid=3276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { perfmon } for pid=3276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { perfmon } for pid=3276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { perfmon } for pid=3276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { perfmon } for pid=3276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { bpf } for pid=3276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit[3276]: AVC avc: denied { bpf } for pid=3276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.038000 audit: BPF prog-id=145 op=LOAD May 13 08:38:49.038000 audit[3276]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002167a8 items=0 ppid=3266 pid=3276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066333036303735356237623538353063356564306365393666613230 May 13 08:38:49.097742 systemd[1]: Started cri-containerd-d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805.scope. May 13 08:38:49.132055 systemd-networkd[993]: cali7549da1169e: Link UP May 13 08:38:49.135722 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7549da1169e: link becomes ready May 13 08:38:49.135673 systemd-networkd[993]: cali7549da1169e: Gained carrier May 13 08:38:49.148846 env[1160]: 2025-05-13 08:38:48.703 [INFO][3200] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 13 08:38:49.148846 env[1160]: 2025-05-13 08:38:48.761 [INFO][3200] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-eth0 calico-apiserver-6dc689f579- calico-apiserver 1770c4b6-19bf-4e86-b869-5eebd27cd9cc 782 0 2025-05-13 08:38:18 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6dc689f579 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-7-n-702ca96d1c.novalocal calico-apiserver-6dc689f579-hm7sz eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali7549da1169e [] []}} ContainerID="52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5" Namespace="calico-apiserver" Pod="calico-apiserver-6dc689f579-hm7sz" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-" May 13 08:38:49.148846 env[1160]: 2025-05-13 08:38:48.761 [INFO][3200] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5" Namespace="calico-apiserver" Pod="calico-apiserver-6dc689f579-hm7sz" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-eth0" May 13 08:38:49.148846 env[1160]: 2025-05-13 08:38:48.810 [INFO][3238] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5" HandleID="k8s-pod-network.52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-eth0" May 13 08:38:49.148846 env[1160]: 2025-05-13 08:38:48.850 [INFO][3238] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5" HandleID="k8s-pod-network.52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003137a0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-7-n-702ca96d1c.novalocal", "pod":"calico-apiserver-6dc689f579-hm7sz", "timestamp":"2025-05-13 08:38:48.809919608 +0000 UTC"}, Hostname:"ci-3510-3-7-n-702ca96d1c.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 08:38:49.148846 env[1160]: 2025-05-13 08:38:48.850 [INFO][3238] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:38:49.148846 env[1160]: 2025-05-13 08:38:49.008 [INFO][3238] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:38:49.148846 env[1160]: 2025-05-13 08:38:49.008 [INFO][3238] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-702ca96d1c.novalocal' May 13 08:38:49.148846 env[1160]: 2025-05-13 08:38:49.021 [INFO][3238] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:49.148846 env[1160]: 2025-05-13 08:38:49.060 [INFO][3238] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:49.148846 env[1160]: 2025-05-13 08:38:49.083 [INFO][3238] ipam/ipam.go 489: Trying affinity for 192.168.120.192/26 host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:49.148846 env[1160]: 2025-05-13 08:38:49.089 [INFO][3238] ipam/ipam.go 155: Attempting to load block cidr=192.168.120.192/26 host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:49.148846 env[1160]: 2025-05-13 08:38:49.098 [INFO][3238] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.120.192/26 host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:49.148846 env[1160]: 2025-05-13 08:38:49.098 [INFO][3238] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.120.192/26 handle="k8s-pod-network.52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:49.148846 env[1160]: 2025-05-13 08:38:49.105 [INFO][3238] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5 May 13 08:38:49.148846 env[1160]: 2025-05-13 08:38:49.116 [INFO][3238] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.120.192/26 handle="k8s-pod-network.52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:49.148846 env[1160]: 2025-05-13 08:38:49.126 [INFO][3238] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.120.195/26] block=192.168.120.192/26 handle="k8s-pod-network.52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:49.148846 env[1160]: 2025-05-13 08:38:49.126 [INFO][3238] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.120.195/26] handle="k8s-pod-network.52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:49.148846 env[1160]: 2025-05-13 08:38:49.126 [INFO][3238] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:38:49.148846 env[1160]: 2025-05-13 08:38:49.126 [INFO][3238] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.120.195/26] IPv6=[] ContainerID="52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5" HandleID="k8s-pod-network.52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-eth0" May 13 08:38:49.149586 env[1160]: 2025-05-13 08:38:49.128 [INFO][3200] cni-plugin/k8s.go 386: Populated endpoint ContainerID="52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5" Namespace="calico-apiserver" Pod="calico-apiserver-6dc689f579-hm7sz" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-eth0", GenerateName:"calico-apiserver-6dc689f579-", Namespace:"calico-apiserver", SelfLink:"", UID:"1770c4b6-19bf-4e86-b869-5eebd27cd9cc", ResourceVersion:"782", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 38, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6dc689f579", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-702ca96d1c.novalocal", ContainerID:"", Pod:"calico-apiserver-6dc689f579-hm7sz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.120.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7549da1169e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:38:49.149586 env[1160]: 2025-05-13 08:38:49.128 [INFO][3200] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.120.195/32] ContainerID="52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5" Namespace="calico-apiserver" Pod="calico-apiserver-6dc689f579-hm7sz" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-eth0" May 13 08:38:49.149586 env[1160]: 2025-05-13 08:38:49.128 [INFO][3200] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7549da1169e ContainerID="52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5" Namespace="calico-apiserver" Pod="calico-apiserver-6dc689f579-hm7sz" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-eth0" May 13 08:38:49.149586 env[1160]: 2025-05-13 08:38:49.132 [INFO][3200] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5" Namespace="calico-apiserver" Pod="calico-apiserver-6dc689f579-hm7sz" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-eth0" May 13 08:38:49.149586 env[1160]: 2025-05-13 08:38:49.132 [INFO][3200] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5" Namespace="calico-apiserver" Pod="calico-apiserver-6dc689f579-hm7sz" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-eth0", GenerateName:"calico-apiserver-6dc689f579-", Namespace:"calico-apiserver", SelfLink:"", UID:"1770c4b6-19bf-4e86-b869-5eebd27cd9cc", ResourceVersion:"782", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 38, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6dc689f579", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-702ca96d1c.novalocal", ContainerID:"52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5", Pod:"calico-apiserver-6dc689f579-hm7sz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.120.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7549da1169e", MAC:"92:b7:ef:a1:fb:f9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:38:49.149586 env[1160]: 2025-05-13 08:38:49.147 [INFO][3200] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5" Namespace="calico-apiserver" Pod="calico-apiserver-6dc689f579-hm7sz" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-eth0" May 13 08:38:49.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.150000 audit: BPF prog-id=146 op=LOAD May 13 08:38:49.151000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.151000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3312 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434323931333361626437663737633130663162346134346439373737 May 13 08:38:49.151000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.151000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3312 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434323931333361626437663737633130663162346134346439373737 May 13 08:38:49.152000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.152000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.152000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.152000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.152000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.152000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.152000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.152000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.152000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.152000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.152000 audit: BPF prog-id=147 op=LOAD May 13 08:38:49.152000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000366b90 items=0 ppid=3312 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434323931333361626437663737633130663162346134346439373737 May 13 08:38:49.153000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.153000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.153000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.153000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.153000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.153000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.153000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.153000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.153000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.153000 audit: BPF prog-id=148 op=LOAD May 13 08:38:49.153000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000366bd8 items=0 ppid=3312 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434323931333361626437663737633130663162346134346439373737 May 13 08:38:49.154000 audit: BPF prog-id=148 op=UNLOAD May 13 08:38:49.154000 audit: BPF prog-id=147 op=UNLOAD May 13 08:38:49.154000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.154000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.154000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.154000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.154000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.154000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.154000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.154000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.154000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.154000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.154000 audit: BPF prog-id=149 op=LOAD May 13 08:38:49.154000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000366fe8 items=0 ppid=3312 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434323931333361626437663737633130663162346134346439373737 May 13 08:38:49.172453 env[1160]: time="2025-05-13T08:38:49.171987380Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 08:38:49.172453 env[1160]: time="2025-05-13T08:38:49.172030181Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 08:38:49.172672 env[1160]: time="2025-05-13T08:38:49.172044708Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 08:38:49.172931 env[1160]: time="2025-05-13T08:38:49.172876178Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5 pid=3356 runtime=io.containerd.runc.v2 May 13 08:38:49.196254 env[1160]: time="2025-05-13T08:38:49.196177537Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7685b4f9bb-gqlkt,Uid:ee88de73-bb38-4d28-8c79-de16aa79a964,Namespace:calico-system,Attempt:1,} returns sandbox id \"0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a\"" May 13 08:38:49.200972 env[1160]: time="2025-05-13T08:38:49.200942501Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 13 08:38:49.213331 systemd[1]: Started cri-containerd-52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5.scope. May 13 08:38:49.222236 env[1160]: time="2025-05-13T08:38:49.222193781Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6dc689f579-kgtzs,Uid:1d7a9809-d4eb-451a-ba79-1d943bd8bb27,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805\"" May 13 08:38:49.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.234000 audit: BPF prog-id=150 op=LOAD May 13 08:38:49.235000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3356 pid=3368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532623966343339333434633462376536353564623062313431306139 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3356 pid=3368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532623966343339333434633462376536353564623062313431306139 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit: BPF prog-id=151 op=LOAD May 13 08:38:49.235000 audit[3368]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003132d0 items=0 ppid=3356 pid=3368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532623966343339333434633462376536353564623062313431306139 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit: BPF prog-id=152 op=LOAD May 13 08:38:49.235000 audit[3368]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000313318 items=0 ppid=3356 pid=3368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532623966343339333434633462376536353564623062313431306139 May 13 08:38:49.235000 audit: BPF prog-id=152 op=UNLOAD May 13 08:38:49.235000 audit: BPF prog-id=151 op=UNLOAD May 13 08:38:49.235000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.235000 audit: BPF prog-id=153 op=LOAD May 13 08:38:49.235000 audit[3368]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000313728 items=0 ppid=3356 pid=3368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532623966343339333434633462376536353564623062313431306139 May 13 08:38:49.268509 env[1160]: time="2025-05-13T08:38:49.268394602Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6dc689f579-hm7sz,Uid:1770c4b6-19bf-4e86-b869-5eebd27cd9cc,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5\"" May 13 08:38:49.476000 audit[3424]: AVC avc: denied { write } for pid=3424 comm="tee" name="fd" dev="proc" ino=26297 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 08:38:49.476000 audit[3424]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffca2ee59fc a2=241 a3=1b6 items=1 ppid=3410 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.476000 audit: CWD cwd="/etc/service/enabled/confd/log" May 13 08:38:49.476000 audit: PATH item=0 name="/dev/fd/63" inode=26294 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:38:49.476000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 08:38:49.529000 audit[3443]: AVC avc: denied { write } for pid=3443 comm="tee" name="fd" dev="proc" ino=26781 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 08:38:49.529000 audit[3443]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcbadf79ec a2=241 a3=1b6 items=1 ppid=3412 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.529000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 13 08:38:49.529000 audit: PATH item=0 name="/dev/fd/63" inode=26317 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:38:49.529000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 08:38:49.535000 audit[3461]: AVC avc: denied { write } for pid=3461 comm="tee" name="fd" dev="proc" ino=26790 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 08:38:49.536000 audit[3448]: AVC avc: denied { write } for pid=3448 comm="tee" name="fd" dev="proc" ino=26793 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 08:38:49.535000 audit[3461]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffeb1f79fd a2=241 a3=1b6 items=1 ppid=3414 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.535000 audit: CWD cwd="/etc/service/enabled/bird/log" May 13 08:38:49.535000 audit: PATH item=0 name="/dev/fd/63" inode=26324 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:38:49.535000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 08:38:49.536000 audit[3448]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc390049fe a2=241 a3=1b6 items=1 ppid=3421 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.536000 audit: CWD cwd="/etc/service/enabled/cni/log" May 13 08:38:49.536000 audit: PATH item=0 name="/dev/fd/63" inode=26771 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:38:49.536000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 08:38:49.538000 audit[3467]: AVC avc: denied { write } for pid=3467 comm="tee" name="fd" dev="proc" ino=26798 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 08:38:49.538000 audit[3467]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffed1a1c9fc a2=241 a3=1b6 items=1 ppid=3420 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.538000 audit: CWD cwd="/etc/service/enabled/felix/log" May 13 08:38:49.538000 audit: PATH item=0 name="/dev/fd/63" inode=26787 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:38:49.538000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 08:38:49.565000 audit[3453]: AVC avc: denied { write } for pid=3453 comm="tee" name="fd" dev="proc" ino=26342 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 08:38:49.565000 audit[3453]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff47c549fc a2=241 a3=1b6 items=1 ppid=3408 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.565000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 13 08:38:49.565000 audit: PATH item=0 name="/dev/fd/63" inode=26774 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:38:49.565000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 08:38:49.572000 audit[3480]: AVC avc: denied { write } for pid=3480 comm="tee" name="fd" dev="proc" ino=26839 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 08:38:49.572000 audit[3480]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff282949ed a2=241 a3=1b6 items=1 ppid=3439 pid=3480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.572000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 13 08:38:49.572000 audit: PATH item=0 name="/dev/fd/63" inode=26808 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:38:49.572000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 08:38:49.845000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.845000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.845000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.845000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.845000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.845000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.845000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.845000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.845000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.845000 audit: BPF prog-id=154 op=LOAD May 13 08:38:49.845000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd03d42830 a2=98 a3=3 items=0 ppid=3430 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.845000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:38:49.847000 audit: BPF prog-id=154 op=UNLOAD May 13 08:38:49.848000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.848000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.848000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.848000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.848000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.848000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.848000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.848000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.848000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.848000 audit: BPF prog-id=155 op=LOAD May 13 08:38:49.848000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd03d42610 a2=74 a3=540051 items=0 ppid=3430 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.848000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:38:49.850000 audit: BPF prog-id=155 op=UNLOAD May 13 08:38:49.850000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.850000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.850000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.850000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.850000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.850000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.850000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.850000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.850000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.850000 audit: BPF prog-id=156 op=LOAD May 13 08:38:49.850000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd03d42640 a2=94 a3=2 items=0 ppid=3430 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.850000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:38:49.851000 audit: BPF prog-id=156 op=UNLOAD May 13 08:38:49.967000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.967000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.967000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.967000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.967000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.967000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.967000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.967000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.967000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.967000 audit: BPF prog-id=157 op=LOAD May 13 08:38:49.967000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd03d42500 a2=40 a3=1 items=0 ppid=3430 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.967000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:38:49.968000 audit: BPF prog-id=157 op=UNLOAD May 13 08:38:49.968000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.968000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd03d425d0 a2=50 a3=7ffd03d426b0 items=0 ppid=3430 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.968000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:38:49.978000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.978000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd03d42510 a2=28 a3=0 items=0 ppid=3430 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.978000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:38:49.978000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.978000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd03d42540 a2=28 a3=0 items=0 ppid=3430 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.978000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:38:49.978000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.978000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd03d42450 a2=28 a3=0 items=0 ppid=3430 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.978000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:38:49.978000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.978000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd03d42560 a2=28 a3=0 items=0 ppid=3430 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.978000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:38:49.978000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.978000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd03d42540 a2=28 a3=0 items=0 ppid=3430 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.978000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:38:49.979000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.979000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd03d42530 a2=28 a3=0 items=0 ppid=3430 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.979000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:38:49.979000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.979000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd03d42560 a2=28 a3=0 items=0 ppid=3430 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.979000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:38:49.979000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.979000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd03d42540 a2=28 a3=0 items=0 ppid=3430 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.979000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:38:49.979000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.979000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd03d42560 a2=28 a3=0 items=0 ppid=3430 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.979000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:38:49.979000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.979000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd03d42530 a2=28 a3=0 items=0 ppid=3430 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.979000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:38:49.980000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.980000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd03d425a0 a2=28 a3=0 items=0 ppid=3430 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.980000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:38:49.980000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.980000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd03d42350 a2=50 a3=1 items=0 ppid=3430 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.980000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:38:49.980000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.980000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.980000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.980000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.980000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.980000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.980000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.980000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.980000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.980000 audit: BPF prog-id=158 op=LOAD May 13 08:38:49.980000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd03d42350 a2=94 a3=5 items=0 ppid=3430 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.980000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:38:49.981000 audit: BPF prog-id=158 op=UNLOAD May 13 08:38:49.981000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.981000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd03d42400 a2=50 a3=1 items=0 ppid=3430 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.981000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:38:49.981000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.981000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd03d42520 a2=4 a3=38 items=0 ppid=3430 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.981000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:38:49.981000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.981000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.981000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.981000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.981000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.981000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.981000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.981000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.981000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.981000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.981000 audit[3540]: AVC avc: denied { confidentiality } for pid=3540 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:38:49.981000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd03d42570 a2=94 a3=6 items=0 ppid=3430 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.981000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:38:49.982000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.982000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.982000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.982000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.982000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.982000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.982000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.982000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.982000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.982000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.982000 audit[3540]: AVC avc: denied { confidentiality } for pid=3540 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:38:49.982000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd03d41d20 a2=94 a3=83 items=0 ppid=3430 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.982000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:38:49.983000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.983000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.983000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.983000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.983000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.983000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.983000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.983000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.983000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.983000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.983000 audit[3540]: AVC avc: denied { confidentiality } for pid=3540 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:38:49.983000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd03d41d20 a2=94 a3=83 items=0 ppid=3430 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.983000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:38:49.998000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.998000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.998000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.998000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.998000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.998000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.998000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.998000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.998000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.998000 audit: BPF prog-id=159 op=LOAD May 13 08:38:49.998000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc9de7aaa0 a2=98 a3=1999999999999999 items=0 ppid=3430 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.998000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 08:38:49.999000 audit: BPF prog-id=159 op=UNLOAD May 13 08:38:49.999000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.999000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.999000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.999000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.999000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.999000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.999000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.999000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.999000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.999000 audit: BPF prog-id=160 op=LOAD May 13 08:38:49.999000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc9de7a980 a2=74 a3=ffff items=0 ppid=3430 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.999000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 08:38:49.999000 audit: BPF prog-id=160 op=UNLOAD May 13 08:38:49.999000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.999000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.999000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.999000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.999000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.999000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.999000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.999000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.999000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:49.999000 audit: BPF prog-id=161 op=LOAD May 13 08:38:49.999000 audit[3543]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc9de7a9c0 a2=40 a3=7ffc9de7aba0 items=0 ppid=3430 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:49.999000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 08:38:50.000000 audit: BPF prog-id=161 op=UNLOAD May 13 08:38:50.102833 systemd-networkd[993]: vxlan.calico: Link UP May 13 08:38:50.102840 systemd-networkd[993]: vxlan.calico: Gained carrier May 13 08:38:50.118000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.118000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.118000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.118000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.118000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.118000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.118000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.118000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.118000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.118000 audit: BPF prog-id=162 op=LOAD May 13 08:38:50.118000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe5d376bd0 a2=98 a3=100 items=0 ppid=3430 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.118000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:38:50.118000 audit: BPF prog-id=162 op=UNLOAD May 13 08:38:50.118000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.118000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.118000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.118000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.118000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.118000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.118000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.118000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.118000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.118000 audit: BPF prog-id=163 op=LOAD May 13 08:38:50.118000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe5d3769e0 a2=74 a3=540051 items=0 ppid=3430 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.118000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:38:50.119000 audit: BPF prog-id=163 op=UNLOAD May 13 08:38:50.119000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit: BPF prog-id=164 op=LOAD May 13 08:38:50.119000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe5d376a10 a2=94 a3=2 items=0 ppid=3430 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:38:50.119000 audit: BPF prog-id=164 op=UNLOAD May 13 08:38:50.119000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe5d3768e0 a2=28 a3=0 items=0 ppid=3430 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe5d376910 a2=28 a3=0 items=0 ppid=3430 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe5d376820 a2=28 a3=0 items=0 ppid=3430 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe5d376930 a2=28 a3=0 items=0 ppid=3430 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe5d376910 a2=28 a3=0 items=0 ppid=3430 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe5d376900 a2=28 a3=0 items=0 ppid=3430 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe5d376930 a2=28 a3=0 items=0 ppid=3430 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe5d376910 a2=28 a3=0 items=0 ppid=3430 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe5d376930 a2=28 a3=0 items=0 ppid=3430 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe5d376900 a2=28 a3=0 items=0 ppid=3430 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe5d376970 a2=28 a3=0 items=0 ppid=3430 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.119000 audit: BPF prog-id=165 op=LOAD May 13 08:38:50.119000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe5d3767e0 a2=40 a3=0 items=0 ppid=3430 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:38:50.119000 audit: BPF prog-id=165 op=UNLOAD May 13 08:38:50.121000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.121000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe5d3767d0 a2=50 a3=2800 items=0 ppid=3430 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.121000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:38:50.121000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.121000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe5d3767d0 a2=50 a3=2800 items=0 ppid=3430 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.121000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:38:50.121000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.121000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.121000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.121000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.121000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.121000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.121000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.121000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.121000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.121000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.121000 audit: BPF prog-id=166 op=LOAD May 13 08:38:50.121000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe5d375ff0 a2=94 a3=2 items=0 ppid=3430 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.121000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:38:50.121000 audit: BPF prog-id=166 op=UNLOAD May 13 08:38:50.121000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.121000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.121000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.121000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.121000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.121000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.121000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.121000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.121000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.121000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.121000 audit: BPF prog-id=167 op=LOAD May 13 08:38:50.121000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe5d3760f0 a2=94 a3=30 items=0 ppid=3430 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.121000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit: BPF prog-id=168 op=LOAD May 13 08:38:50.129000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdd3f97cc0 a2=98 a3=0 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.129000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.129000 audit: BPF prog-id=168 op=UNLOAD May 13 08:38:50.129000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit: BPF prog-id=169 op=LOAD May 13 08:38:50.129000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdd3f97aa0 a2=74 a3=540051 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.129000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.129000 audit: BPF prog-id=169 op=UNLOAD May 13 08:38:50.129000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.129000 audit: BPF prog-id=170 op=LOAD May 13 08:38:50.129000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdd3f97ad0 a2=94 a3=2 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.129000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.129000 audit: BPF prog-id=170 op=UNLOAD May 13 08:38:50.260741 systemd-networkd[993]: cali7549da1169e: Gained IPv6LL May 13 08:38:50.261045 systemd-networkd[993]: cali7b025663018: Gained IPv6LL May 13 08:38:50.281000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.281000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.281000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.281000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.281000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.281000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.281000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.281000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.281000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.281000 audit: BPF prog-id=171 op=LOAD May 13 08:38:50.281000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdd3f97990 a2=40 a3=1 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.281000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.282000 audit: BPF prog-id=171 op=UNLOAD May 13 08:38:50.282000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.282000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdd3f97a60 a2=50 a3=7ffdd3f97b40 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.282000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.292000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.292000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd3f979a0 a2=28 a3=0 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.292000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.292000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.292000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd3f979d0 a2=28 a3=0 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.292000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.292000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.292000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd3f978e0 a2=28 a3=0 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.292000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.292000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.292000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd3f979f0 a2=28 a3=0 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.292000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.293000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.293000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd3f979d0 a2=28 a3=0 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.293000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.293000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd3f979c0 a2=28 a3=0 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.293000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.293000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd3f979f0 a2=28 a3=0 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.293000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.293000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd3f979d0 a2=28 a3=0 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.293000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.293000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd3f979f0 a2=28 a3=0 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.294000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.294000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd3f979c0 a2=28 a3=0 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.294000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.294000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.294000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd3f97a30 a2=28 a3=0 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.294000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.294000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.294000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdd3f977e0 a2=50 a3=1 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.294000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.295000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.295000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.295000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.295000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.295000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.295000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.295000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.295000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.295000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.295000 audit: BPF prog-id=172 op=LOAD May 13 08:38:50.295000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdd3f977e0 a2=94 a3=5 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.295000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.295000 audit: BPF prog-id=172 op=UNLOAD May 13 08:38:50.295000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.295000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdd3f97890 a2=50 a3=1 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.295000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.295000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.295000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdd3f979b0 a2=4 a3=38 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.295000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.296000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.296000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.296000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.296000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.296000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.296000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.296000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.296000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.296000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.296000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.296000 audit[3573]: AVC avc: denied { confidentiality } for pid=3573 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:38:50.296000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdd3f97a00 a2=94 a3=6 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.296000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.297000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.297000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.297000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.297000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.297000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.297000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.297000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.297000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.297000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.297000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.297000 audit[3573]: AVC avc: denied { confidentiality } for pid=3573 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:38:50.297000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdd3f971b0 a2=94 a3=83 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.297000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.297000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.297000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.297000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.297000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.297000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.297000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.297000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.297000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.297000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.297000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.297000 audit[3573]: AVC avc: denied { confidentiality } for pid=3573 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:38:50.297000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdd3f971b0 a2=94 a3=83 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.297000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.298000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.298000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdd3f98bf0 a2=10 a3=f0f1 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.298000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.299000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.299000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdd3f98a90 a2=10 a3=3 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.299000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.299000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.299000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdd3f98a30 a2=10 a3=3 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.299000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.299000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.299000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdd3f98a30 a2=10 a3=7 items=0 ppid=3430 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.299000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:38:50.306000 audit: BPF prog-id=167 op=UNLOAD May 13 08:38:50.361780 env[1160]: time="2025-05-13T08:38:50.360376545Z" level=info msg="StopPodSandbox for \"981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3\"" May 13 08:38:50.387000 audit[3620]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3620 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 08:38:50.387000 audit[3620]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd4b444060 a2=0 a3=7ffd4b44404c items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.387000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 08:38:50.401000 audit[3618]: NETFILTER_CFG table=raw:98 family=2 entries=21 op=nft_register_chain pid=3618 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 08:38:50.401000 audit[3618]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd91c28800 a2=0 a3=7ffd91c287ec items=0 ppid=3430 pid=3618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.401000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 08:38:50.403000 audit[3619]: NETFILTER_CFG table=nat:99 family=2 entries=15 op=nft_register_chain pid=3619 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 08:38:50.403000 audit[3619]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff127f9100 a2=0 a3=7fff127f90ec items=0 ppid=3430 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.403000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 08:38:50.418000 audit[3624]: NETFILTER_CFG table=filter:100 family=2 entries=137 op=nft_register_chain pid=3624 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 08:38:50.418000 audit[3624]: SYSCALL arch=c000003e syscall=46 success=yes exit=78464 a0=3 a1=7fff276db120 a2=0 a3=7fff276db10c items=0 ppid=3430 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.418000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 08:38:50.491716 env[1160]: 2025-05-13 08:38:50.455 [INFO][3611] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" May 13 08:38:50.491716 env[1160]: 2025-05-13 08:38:50.455 [INFO][3611] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" iface="eth0" netns="/var/run/netns/cni-e0055543-d79c-8dd4-26f0-56f8bd9141f5" May 13 08:38:50.491716 env[1160]: 2025-05-13 08:38:50.455 [INFO][3611] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" iface="eth0" netns="/var/run/netns/cni-e0055543-d79c-8dd4-26f0-56f8bd9141f5" May 13 08:38:50.491716 env[1160]: 2025-05-13 08:38:50.455 [INFO][3611] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" iface="eth0" netns="/var/run/netns/cni-e0055543-d79c-8dd4-26f0-56f8bd9141f5" May 13 08:38:50.491716 env[1160]: 2025-05-13 08:38:50.455 [INFO][3611] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" May 13 08:38:50.491716 env[1160]: 2025-05-13 08:38:50.455 [INFO][3611] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" May 13 08:38:50.491716 env[1160]: 2025-05-13 08:38:50.479 [INFO][3630] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" HandleID="k8s-pod-network.981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-eth0" May 13 08:38:50.491716 env[1160]: 2025-05-13 08:38:50.480 [INFO][3630] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:38:50.491716 env[1160]: 2025-05-13 08:38:50.480 [INFO][3630] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:38:50.491716 env[1160]: 2025-05-13 08:38:50.488 [WARNING][3630] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" HandleID="k8s-pod-network.981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-eth0" May 13 08:38:50.491716 env[1160]: 2025-05-13 08:38:50.488 [INFO][3630] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" HandleID="k8s-pod-network.981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-eth0" May 13 08:38:50.491716 env[1160]: 2025-05-13 08:38:50.489 [INFO][3630] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:38:50.491716 env[1160]: 2025-05-13 08:38:50.490 [INFO][3611] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" May 13 08:38:50.494784 env[1160]: time="2025-05-13T08:38:50.494737929Z" level=info msg="TearDown network for sandbox \"981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3\" successfully" May 13 08:38:50.494820 systemd[1]: run-netns-cni\x2de0055543\x2dd79c\x2d8dd4\x2d26f0\x2d56f8bd9141f5.mount: Deactivated successfully. May 13 08:38:50.495708 env[1160]: time="2025-05-13T08:38:50.495686921Z" level=info msg="StopPodSandbox for \"981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3\" returns successfully" May 13 08:38:50.496418 env[1160]: time="2025-05-13T08:38:50.496396109Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wnsw4,Uid:14293fd4-c5b5-4b77-9cbd-af7d79ab2352,Namespace:calico-system,Attempt:1,}" May 13 08:38:50.872725 systemd-networkd[993]: calib81e4db3acd: Link UP May 13 08:38:50.874673 systemd-networkd[993]: calib81e4db3acd: Gained carrier May 13 08:38:50.875549 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib81e4db3acd: link becomes ready May 13 08:38:50.899116 env[1160]: 2025-05-13 08:38:50.732 [INFO][3640] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-eth0 csi-node-driver- calico-system 14293fd4-c5b5-4b77-9cbd-af7d79ab2352 802 0 2025-05-13 08:38:18 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5bcd8f69 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510-3-7-n-702ca96d1c.novalocal csi-node-driver-wnsw4 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calib81e4db3acd [] []}} ContainerID="ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a" Namespace="calico-system" Pod="csi-node-driver-wnsw4" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-" May 13 08:38:50.899116 env[1160]: 2025-05-13 08:38:50.732 [INFO][3640] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a" Namespace="calico-system" Pod="csi-node-driver-wnsw4" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-eth0" May 13 08:38:50.899116 env[1160]: 2025-05-13 08:38:50.805 [INFO][3651] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a" HandleID="k8s-pod-network.ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-eth0" May 13 08:38:50.899116 env[1160]: 2025-05-13 08:38:50.823 [INFO][3651] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a" HandleID="k8s-pod-network.ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ec530), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-7-n-702ca96d1c.novalocal", "pod":"csi-node-driver-wnsw4", "timestamp":"2025-05-13 08:38:50.805864339 +0000 UTC"}, Hostname:"ci-3510-3-7-n-702ca96d1c.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 08:38:50.899116 env[1160]: 2025-05-13 08:38:50.823 [INFO][3651] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:38:50.899116 env[1160]: 2025-05-13 08:38:50.823 [INFO][3651] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:38:50.899116 env[1160]: 2025-05-13 08:38:50.823 [INFO][3651] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-702ca96d1c.novalocal' May 13 08:38:50.899116 env[1160]: 2025-05-13 08:38:50.826 [INFO][3651] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:50.899116 env[1160]: 2025-05-13 08:38:50.831 [INFO][3651] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:50.899116 env[1160]: 2025-05-13 08:38:50.837 [INFO][3651] ipam/ipam.go 489: Trying affinity for 192.168.120.192/26 host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:50.899116 env[1160]: 2025-05-13 08:38:50.839 [INFO][3651] ipam/ipam.go 155: Attempting to load block cidr=192.168.120.192/26 host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:50.899116 env[1160]: 2025-05-13 08:38:50.841 [INFO][3651] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.120.192/26 host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:50.899116 env[1160]: 2025-05-13 08:38:50.841 [INFO][3651] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.120.192/26 handle="k8s-pod-network.ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:50.899116 env[1160]: 2025-05-13 08:38:50.843 [INFO][3651] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a May 13 08:38:50.899116 env[1160]: 2025-05-13 08:38:50.849 [INFO][3651] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.120.192/26 handle="k8s-pod-network.ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:50.899116 env[1160]: 2025-05-13 08:38:50.865 [INFO][3651] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.120.196/26] block=192.168.120.192/26 handle="k8s-pod-network.ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:50.899116 env[1160]: 2025-05-13 08:38:50.865 [INFO][3651] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.120.196/26] handle="k8s-pod-network.ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:50.899116 env[1160]: 2025-05-13 08:38:50.865 [INFO][3651] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:38:50.899116 env[1160]: 2025-05-13 08:38:50.865 [INFO][3651] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.120.196/26] IPv6=[] ContainerID="ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a" HandleID="k8s-pod-network.ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-eth0" May 13 08:38:50.900396 env[1160]: 2025-05-13 08:38:50.867 [INFO][3640] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a" Namespace="calico-system" Pod="csi-node-driver-wnsw4" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"14293fd4-c5b5-4b77-9cbd-af7d79ab2352", ResourceVersion:"802", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 38, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-702ca96d1c.novalocal", ContainerID:"", Pod:"csi-node-driver-wnsw4", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.120.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib81e4db3acd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:38:50.900396 env[1160]: 2025-05-13 08:38:50.867 [INFO][3640] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.120.196/32] ContainerID="ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a" Namespace="calico-system" Pod="csi-node-driver-wnsw4" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-eth0" May 13 08:38:50.900396 env[1160]: 2025-05-13 08:38:50.867 [INFO][3640] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib81e4db3acd ContainerID="ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a" Namespace="calico-system" Pod="csi-node-driver-wnsw4" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-eth0" May 13 08:38:50.900396 env[1160]: 2025-05-13 08:38:50.880 [INFO][3640] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a" Namespace="calico-system" Pod="csi-node-driver-wnsw4" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-eth0" May 13 08:38:50.900396 env[1160]: 2025-05-13 08:38:50.881 [INFO][3640] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a" Namespace="calico-system" Pod="csi-node-driver-wnsw4" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"14293fd4-c5b5-4b77-9cbd-af7d79ab2352", ResourceVersion:"802", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 38, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-702ca96d1c.novalocal", ContainerID:"ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a", Pod:"csi-node-driver-wnsw4", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.120.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib81e4db3acd", MAC:"4e:32:d0:38:0d:34", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:38:50.900396 env[1160]: 2025-05-13 08:38:50.897 [INFO][3640] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a" Namespace="calico-system" Pod="csi-node-driver-wnsw4" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-eth0" May 13 08:38:50.925870 env[1160]: time="2025-05-13T08:38:50.925762669Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 08:38:50.926022 env[1160]: time="2025-05-13T08:38:50.925855715Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 08:38:50.926022 env[1160]: time="2025-05-13T08:38:50.925890931Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 08:38:50.926277 env[1160]: time="2025-05-13T08:38:50.926238116Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a pid=3677 runtime=io.containerd.runc.v2 May 13 08:38:50.961443 systemd[1]: run-containerd-runc-k8s.io-ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a-runc.e9St3I.mount: Deactivated successfully. May 13 08:38:50.955000 audit[3701]: NETFILTER_CFG table=filter:101 family=2 entries=38 op=nft_register_chain pid=3701 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 08:38:50.955000 audit[3701]: SYSCALL arch=c000003e syscall=46 success=yes exit=19812 a0=3 a1=7ffd509c3540 a2=0 a3=7ffd509c352c items=0 ppid=3430 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.955000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 08:38:50.966757 systemd[1]: Started cri-containerd-ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a.scope. May 13 08:38:50.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.978000 audit: BPF prog-id=173 op=LOAD May 13 08:38:50.980000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.980000 audit[3689]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3677 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383138396434393833393861306166396637386266313565646133 May 13 08:38:50.980000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.980000 audit[3689]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3677 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383138396434393833393861306166396637386266313565646133 May 13 08:38:50.980000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.980000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.980000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.980000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.980000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.980000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.980000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.980000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.980000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.980000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.980000 audit: BPF prog-id=174 op=LOAD May 13 08:38:50.980000 audit[3689]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0003421a0 items=0 ppid=3677 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383138396434393833393861306166396637386266313565646133 May 13 08:38:50.980000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.980000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.980000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.980000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.980000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.980000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.980000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.980000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.980000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.980000 audit: BPF prog-id=175 op=LOAD May 13 08:38:50.980000 audit[3689]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0003421e8 items=0 ppid=3677 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383138396434393833393861306166396637386266313565646133 May 13 08:38:50.980000 audit: BPF prog-id=175 op=UNLOAD May 13 08:38:50.981000 audit: BPF prog-id=174 op=UNLOAD May 13 08:38:50.981000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.981000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.981000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.981000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.981000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.981000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.981000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.981000 audit[3689]: AVC avc: denied { perfmon } for pid=3689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.981000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.981000 audit[3689]: AVC avc: denied { bpf } for pid=3689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:50.981000 audit: BPF prog-id=176 op=LOAD May 13 08:38:50.981000 audit[3689]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0003425f8 items=0 ppid=3677 pid=3689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:50.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383138396434393833393861306166396637386266313565646133 May 13 08:38:50.998072 env[1160]: time="2025-05-13T08:38:50.998030907Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wnsw4,Uid:14293fd4-c5b5-4b77-9cbd-af7d79ab2352,Namespace:calico-system,Attempt:1,} returns sandbox id \"ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a\"" May 13 08:38:51.028653 systemd-networkd[993]: cali3cfb0c4082d: Gained IPv6LL May 13 08:38:51.605391 systemd-networkd[993]: vxlan.calico: Gained IPv6LL May 13 08:38:51.925018 systemd-networkd[993]: calib81e4db3acd: Gained IPv6LL May 13 08:38:54.875423 env[1160]: time="2025-05-13T08:38:54.875386331Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:54.878849 env[1160]: time="2025-05-13T08:38:54.878828973Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:54.881686 env[1160]: time="2025-05-13T08:38:54.881666624Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:54.884401 env[1160]: time="2025-05-13T08:38:54.884378289Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:38:54.885124 env[1160]: time="2025-05-13T08:38:54.885101683Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 13 08:38:54.887987 env[1160]: time="2025-05-13T08:38:54.887965474Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 13 08:38:54.929178 env[1160]: time="2025-05-13T08:38:54.929143611Z" level=info msg="CreateContainer within sandbox \"0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 13 08:38:55.238707 env[1160]: time="2025-05-13T08:38:55.238572662Z" level=info msg="CreateContainer within sandbox \"0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"644bb87984673b39373ec4ba8c44c09fca429c2849b5090bcdf2609d55c97858\"" May 13 08:38:55.240395 env[1160]: time="2025-05-13T08:38:55.240329725Z" level=info msg="StartContainer for \"644bb87984673b39373ec4ba8c44c09fca429c2849b5090bcdf2609d55c97858\"" May 13 08:38:55.244265 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2965145427.mount: Deactivated successfully. May 13 08:38:55.291828 systemd[1]: Started cri-containerd-644bb87984673b39373ec4ba8c44c09fca429c2849b5090bcdf2609d55c97858.scope. May 13 08:38:55.312327 kernel: kauditd_printk_skb: 736 callbacks suppressed May 13 08:38:55.312424 kernel: audit: type=1400 audit(1747125535.309:1123): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.325297 kernel: audit: type=1400 audit(1747125535.309:1124): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.325355 kernel: audit: type=1400 audit(1747125535.309:1125): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.329641 kernel: audit: type=1400 audit(1747125535.309:1126): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.329684 kernel: audit: type=1400 audit(1747125535.309:1127): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.334012 kernel: audit: type=1400 audit(1747125535.309:1128): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.343540 kernel: audit: type=1400 audit(1747125535.309:1129): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.343604 kernel: audit: type=1400 audit(1747125535.309:1130): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.352450 kernel: audit: type=1400 audit(1747125535.309:1131): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.352515 kernel: audit: type=1400 audit(1747125535.311:1132): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.311000 audit: BPF prog-id=177 op=LOAD May 13 08:38:55.315000 audit[3726]: AVC avc: denied { bpf } for pid=3726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3266 pid=3726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:55.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634346262383739383436373362333933373365633462613863343463 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { perfmon } for pid=3726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3266 pid=3726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:55.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634346262383739383436373362333933373365633462613863343463 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { bpf } for pid=3726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { bpf } for pid=3726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { bpf } for pid=3726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { perfmon } for pid=3726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { perfmon } for pid=3726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { perfmon } for pid=3726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { perfmon } for pid=3726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { perfmon } for pid=3726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { bpf } for pid=3726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { bpf } for pid=3726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit: BPF prog-id=178 op=LOAD May 13 08:38:55.315000 audit[3726]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002ff0e0 items=0 ppid=3266 pid=3726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:55.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634346262383739383436373362333933373365633462613863343463 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { bpf } for pid=3726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { bpf } for pid=3726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { perfmon } for pid=3726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { perfmon } for pid=3726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { perfmon } for pid=3726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { perfmon } for pid=3726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { perfmon } for pid=3726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { bpf } for pid=3726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { bpf } for pid=3726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit: BPF prog-id=179 op=LOAD May 13 08:38:55.315000 audit[3726]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002ff128 items=0 ppid=3266 pid=3726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:55.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634346262383739383436373362333933373365633462613863343463 May 13 08:38:55.315000 audit: BPF prog-id=179 op=UNLOAD May 13 08:38:55.315000 audit: BPF prog-id=178 op=UNLOAD May 13 08:38:55.315000 audit[3726]: AVC avc: denied { bpf } for pid=3726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { bpf } for pid=3726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { bpf } for pid=3726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { perfmon } for pid=3726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { perfmon } for pid=3726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { perfmon } for pid=3726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { perfmon } for pid=3726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { perfmon } for pid=3726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { bpf } for pid=3726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit[3726]: AVC avc: denied { bpf } for pid=3726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:55.315000 audit: BPF prog-id=180 op=LOAD May 13 08:38:55.315000 audit[3726]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002ff538 items=0 ppid=3266 pid=3726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:55.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634346262383739383436373362333933373365633462613863343463 May 13 08:38:55.372975 env[1160]: time="2025-05-13T08:38:55.372940610Z" level=info msg="StartContainer for \"644bb87984673b39373ec4ba8c44c09fca429c2849b5090bcdf2609d55c97858\" returns successfully" May 13 08:38:55.673908 kubelet[1940]: I0513 08:38:55.673724 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7685b4f9bb-gqlkt" podStartSLOduration=31.984160578 podStartE2EDuration="37.673653464s" podCreationTimestamp="2025-05-13 08:38:18 +0000 UTC" firstStartedPulling="2025-05-13 08:38:49.197885982 +0000 UTC m=+43.151005663" lastFinishedPulling="2025-05-13 08:38:54.887378817 +0000 UTC m=+48.840498549" observedRunningTime="2025-05-13 08:38:55.601080959 +0000 UTC m=+49.554200680" watchObservedRunningTime="2025-05-13 08:38:55.673653464 +0000 UTC m=+49.626773185" May 13 08:38:58.359932 env[1160]: time="2025-05-13T08:38:58.358720059Z" level=info msg="StopPodSandbox for \"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\"" May 13 08:38:58.458335 env[1160]: 2025-05-13 08:38:58.416 [INFO][3796] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" May 13 08:38:58.458335 env[1160]: 2025-05-13 08:38:58.416 [INFO][3796] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" iface="eth0" netns="/var/run/netns/cni-9c94de75-2cdd-f093-8be7-a335a6d2afae" May 13 08:38:58.458335 env[1160]: 2025-05-13 08:38:58.416 [INFO][3796] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" iface="eth0" netns="/var/run/netns/cni-9c94de75-2cdd-f093-8be7-a335a6d2afae" May 13 08:38:58.458335 env[1160]: 2025-05-13 08:38:58.418 [INFO][3796] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" iface="eth0" netns="/var/run/netns/cni-9c94de75-2cdd-f093-8be7-a335a6d2afae" May 13 08:38:58.458335 env[1160]: 2025-05-13 08:38:58.418 [INFO][3796] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" May 13 08:38:58.458335 env[1160]: 2025-05-13 08:38:58.418 [INFO][3796] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" May 13 08:38:58.458335 env[1160]: 2025-05-13 08:38:58.445 [INFO][3803] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" HandleID="k8s-pod-network.0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-eth0" May 13 08:38:58.458335 env[1160]: 2025-05-13 08:38:58.446 [INFO][3803] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:38:58.458335 env[1160]: 2025-05-13 08:38:58.446 [INFO][3803] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:38:58.458335 env[1160]: 2025-05-13 08:38:58.453 [WARNING][3803] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" HandleID="k8s-pod-network.0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-eth0" May 13 08:38:58.458335 env[1160]: 2025-05-13 08:38:58.453 [INFO][3803] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" HandleID="k8s-pod-network.0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-eth0" May 13 08:38:58.458335 env[1160]: 2025-05-13 08:38:58.455 [INFO][3803] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:38:58.458335 env[1160]: 2025-05-13 08:38:58.457 [INFO][3796] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" May 13 08:38:58.461968 env[1160]: time="2025-05-13T08:38:58.461229875Z" level=info msg="TearDown network for sandbox \"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\" successfully" May 13 08:38:58.461968 env[1160]: time="2025-05-13T08:38:58.461269680Z" level=info msg="StopPodSandbox for \"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\" returns successfully" May 13 08:38:58.461434 systemd[1]: run-netns-cni\x2d9c94de75\x2d2cdd\x2df093\x2d8be7\x2da335a6d2afae.mount: Deactivated successfully. May 13 08:38:58.462815 env[1160]: time="2025-05-13T08:38:58.462790226Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-frqhd,Uid:ad79d4a2-2f47-4184-9900-a632651cccb9,Namespace:kube-system,Attempt:1,}" May 13 08:38:58.621669 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 08:38:58.621765 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie1d0a5d698d: link becomes ready May 13 08:38:58.619992 systemd-networkd[993]: calie1d0a5d698d: Link UP May 13 08:38:58.622365 systemd-networkd[993]: calie1d0a5d698d: Gained carrier May 13 08:38:58.639883 env[1160]: 2025-05-13 08:38:58.523 [INFO][3810] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-eth0 coredns-6f6b679f8f- kube-system ad79d4a2-2f47-4184-9900-a632651cccb9 833 0 2025-05-13 08:38:11 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-7-n-702ca96d1c.novalocal coredns-6f6b679f8f-frqhd eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calie1d0a5d698d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707" Namespace="kube-system" Pod="coredns-6f6b679f8f-frqhd" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-" May 13 08:38:58.639883 env[1160]: 2025-05-13 08:38:58.523 [INFO][3810] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707" Namespace="kube-system" Pod="coredns-6f6b679f8f-frqhd" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-eth0" May 13 08:38:58.639883 env[1160]: 2025-05-13 08:38:58.563 [INFO][3823] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707" HandleID="k8s-pod-network.7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-eth0" May 13 08:38:58.639883 env[1160]: 2025-05-13 08:38:58.574 [INFO][3823] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707" HandleID="k8s-pod-network.7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002e7b10), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-7-n-702ca96d1c.novalocal", "pod":"coredns-6f6b679f8f-frqhd", "timestamp":"2025-05-13 08:38:58.563532611 +0000 UTC"}, Hostname:"ci-3510-3-7-n-702ca96d1c.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 08:38:58.639883 env[1160]: 2025-05-13 08:38:58.574 [INFO][3823] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:38:58.639883 env[1160]: 2025-05-13 08:38:58.574 [INFO][3823] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:38:58.639883 env[1160]: 2025-05-13 08:38:58.574 [INFO][3823] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-702ca96d1c.novalocal' May 13 08:38:58.639883 env[1160]: 2025-05-13 08:38:58.577 [INFO][3823] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:58.639883 env[1160]: 2025-05-13 08:38:58.585 [INFO][3823] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:58.639883 env[1160]: 2025-05-13 08:38:58.591 [INFO][3823] ipam/ipam.go 489: Trying affinity for 192.168.120.192/26 host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:58.639883 env[1160]: 2025-05-13 08:38:58.593 [INFO][3823] ipam/ipam.go 155: Attempting to load block cidr=192.168.120.192/26 host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:58.639883 env[1160]: 2025-05-13 08:38:58.596 [INFO][3823] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.120.192/26 host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:58.639883 env[1160]: 2025-05-13 08:38:58.596 [INFO][3823] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.120.192/26 handle="k8s-pod-network.7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:58.639883 env[1160]: 2025-05-13 08:38:58.598 [INFO][3823] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707 May 13 08:38:58.639883 env[1160]: 2025-05-13 08:38:58.603 [INFO][3823] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.120.192/26 handle="k8s-pod-network.7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:58.639883 env[1160]: 2025-05-13 08:38:58.612 [INFO][3823] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.120.197/26] block=192.168.120.192/26 handle="k8s-pod-network.7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:58.639883 env[1160]: 2025-05-13 08:38:58.612 [INFO][3823] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.120.197/26] handle="k8s-pod-network.7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:58.639883 env[1160]: 2025-05-13 08:38:58.612 [INFO][3823] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:38:58.639883 env[1160]: 2025-05-13 08:38:58.612 [INFO][3823] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.120.197/26] IPv6=[] ContainerID="7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707" HandleID="k8s-pod-network.7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-eth0" May 13 08:38:58.640582 env[1160]: 2025-05-13 08:38:58.614 [INFO][3810] cni-plugin/k8s.go 386: Populated endpoint ContainerID="7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707" Namespace="kube-system" Pod="coredns-6f6b679f8f-frqhd" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"ad79d4a2-2f47-4184-9900-a632651cccb9", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-702ca96d1c.novalocal", ContainerID:"", Pod:"coredns-6f6b679f8f-frqhd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.120.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie1d0a5d698d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:38:58.640582 env[1160]: 2025-05-13 08:38:58.614 [INFO][3810] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.120.197/32] ContainerID="7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707" Namespace="kube-system" Pod="coredns-6f6b679f8f-frqhd" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-eth0" May 13 08:38:58.640582 env[1160]: 2025-05-13 08:38:58.614 [INFO][3810] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie1d0a5d698d ContainerID="7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707" Namespace="kube-system" Pod="coredns-6f6b679f8f-frqhd" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-eth0" May 13 08:38:58.640582 env[1160]: 2025-05-13 08:38:58.623 [INFO][3810] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707" Namespace="kube-system" Pod="coredns-6f6b679f8f-frqhd" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-eth0" May 13 08:38:58.640582 env[1160]: 2025-05-13 08:38:58.623 [INFO][3810] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707" Namespace="kube-system" Pod="coredns-6f6b679f8f-frqhd" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"ad79d4a2-2f47-4184-9900-a632651cccb9", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-702ca96d1c.novalocal", ContainerID:"7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707", Pod:"coredns-6f6b679f8f-frqhd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.120.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie1d0a5d698d", MAC:"f6:d8:fd:fa:db:82", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:38:58.640582 env[1160]: 2025-05-13 08:38:58.638 [INFO][3810] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707" Namespace="kube-system" Pod="coredns-6f6b679f8f-frqhd" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-eth0" May 13 08:38:58.660773 env[1160]: time="2025-05-13T08:38:58.660699797Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 08:38:58.661022 env[1160]: time="2025-05-13T08:38:58.660957733Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 08:38:58.661154 env[1160]: time="2025-05-13T08:38:58.661131711Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 08:38:58.659000 audit[3849]: NETFILTER_CFG table=filter:102 family=2 entries=46 op=nft_register_chain pid=3849 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 08:38:58.659000 audit[3849]: SYSCALL arch=c000003e syscall=46 success=yes exit=22696 a0=3 a1=7fff8b6ebaf0 a2=0 a3=7fff8b6ebadc items=0 ppid=3430 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:58.659000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 08:38:58.661853 env[1160]: time="2025-05-13T08:38:58.661402391Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707 pid=3850 runtime=io.containerd.runc.v2 May 13 08:38:58.692302 systemd[1]: Started cri-containerd-7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707.scope. May 13 08:38:58.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.701000 audit: BPF prog-id=181 op=LOAD May 13 08:38:58.702000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3850 pid=3861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:58.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738383061633664313864333164643862356334383038363064663132 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3850 pid=3861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:58.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738383061633664313864333164643862356334383038363064663132 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit: BPF prog-id=182 op=LOAD May 13 08:38:58.702000 audit[3861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d85c0 items=0 ppid=3850 pid=3861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:58.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738383061633664313864333164643862356334383038363064663132 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit: BPF prog-id=183 op=LOAD May 13 08:38:58.702000 audit[3861]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d8608 items=0 ppid=3850 pid=3861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:58.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738383061633664313864333164643862356334383038363064663132 May 13 08:38:58.702000 audit: BPF prog-id=183 op=UNLOAD May 13 08:38:58.702000 audit: BPF prog-id=182 op=UNLOAD May 13 08:38:58.702000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.702000 audit: BPF prog-id=184 op=LOAD May 13 08:38:58.702000 audit[3861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d8a18 items=0 ppid=3850 pid=3861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:58.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738383061633664313864333164643862356334383038363064663132 May 13 08:38:58.739551 env[1160]: time="2025-05-13T08:38:58.739515954Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-frqhd,Uid:ad79d4a2-2f47-4184-9900-a632651cccb9,Namespace:kube-system,Attempt:1,} returns sandbox id \"7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707\"" May 13 08:38:58.746706 env[1160]: time="2025-05-13T08:38:58.746675979Z" level=info msg="CreateContainer within sandbox \"7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 13 08:38:58.845110 env[1160]: time="2025-05-13T08:38:58.845070829Z" level=info msg="CreateContainer within sandbox \"7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"08011755faba5ec6b6bf4df8d57a43e429b5919f0c80e57e53de656d89c7ef72\"" May 13 08:38:58.846622 env[1160]: time="2025-05-13T08:38:58.846584673Z" level=info msg="StartContainer for \"08011755faba5ec6b6bf4df8d57a43e429b5919f0c80e57e53de656d89c7ef72\"" May 13 08:38:58.871739 systemd[1]: Started cri-containerd-08011755faba5ec6b6bf4df8d57a43e429b5919f0c80e57e53de656d89c7ef72.scope. May 13 08:38:58.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.885000 audit: BPF prog-id=185 op=LOAD May 13 08:38:58.886000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.886000 audit[3892]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3850 pid=3892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:58.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038303131373535666162613565633662366266346466386435376134 May 13 08:38:58.886000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.886000 audit[3892]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3850 pid=3892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:58.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038303131373535666162613565633662366266346466386435376134 May 13 08:38:58.886000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.886000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.886000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.886000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.886000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.886000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.886000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.886000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.886000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.886000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.886000 audit: BPF prog-id=186 op=LOAD May 13 08:38:58.886000 audit[3892]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001dfd50 items=0 ppid=3850 pid=3892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:58.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038303131373535666162613565633662366266346466386435376134 May 13 08:38:58.887000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.887000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.887000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.887000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.887000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.887000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.887000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.887000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.887000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.887000 audit: BPF prog-id=187 op=LOAD May 13 08:38:58.887000 audit[3892]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001dfd98 items=0 ppid=3850 pid=3892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:58.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038303131373535666162613565633662366266346466386435376134 May 13 08:38:58.888000 audit: BPF prog-id=187 op=UNLOAD May 13 08:38:58.888000 audit: BPF prog-id=186 op=UNLOAD May 13 08:38:58.888000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.888000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.888000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.888000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.888000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.888000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.888000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.888000 audit[3892]: AVC avc: denied { perfmon } for pid=3892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.888000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.888000 audit[3892]: AVC avc: denied { bpf } for pid=3892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:58.888000 audit: BPF prog-id=188 op=LOAD May 13 08:38:58.888000 audit[3892]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028e1a8 items=0 ppid=3850 pid=3892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:58.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038303131373535666162613565633662366266346466386435376134 May 13 08:38:58.910713 env[1160]: time="2025-05-13T08:38:58.910669754Z" level=info msg="StartContainer for \"08011755faba5ec6b6bf4df8d57a43e429b5919f0c80e57e53de656d89c7ef72\" returns successfully" May 13 08:38:59.359825 env[1160]: time="2025-05-13T08:38:59.359745018Z" level=info msg="StopPodSandbox for \"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\"" May 13 08:38:59.478780 env[1160]: 2025-05-13 08:38:59.436 [INFO][3936] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" May 13 08:38:59.478780 env[1160]: 2025-05-13 08:38:59.436 [INFO][3936] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" iface="eth0" netns="/var/run/netns/cni-eb01c9d6-1848-1181-02bd-93e8aa02950c" May 13 08:38:59.478780 env[1160]: 2025-05-13 08:38:59.436 [INFO][3936] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" iface="eth0" netns="/var/run/netns/cni-eb01c9d6-1848-1181-02bd-93e8aa02950c" May 13 08:38:59.478780 env[1160]: 2025-05-13 08:38:59.436 [INFO][3936] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" iface="eth0" netns="/var/run/netns/cni-eb01c9d6-1848-1181-02bd-93e8aa02950c" May 13 08:38:59.478780 env[1160]: 2025-05-13 08:38:59.436 [INFO][3936] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" May 13 08:38:59.478780 env[1160]: 2025-05-13 08:38:59.436 [INFO][3936] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" May 13 08:38:59.478780 env[1160]: 2025-05-13 08:38:59.468 [INFO][3943] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" HandleID="k8s-pod-network.e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-eth0" May 13 08:38:59.478780 env[1160]: 2025-05-13 08:38:59.468 [INFO][3943] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:38:59.478780 env[1160]: 2025-05-13 08:38:59.468 [INFO][3943] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:38:59.478780 env[1160]: 2025-05-13 08:38:59.475 [WARNING][3943] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" HandleID="k8s-pod-network.e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-eth0" May 13 08:38:59.478780 env[1160]: 2025-05-13 08:38:59.475 [INFO][3943] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" HandleID="k8s-pod-network.e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-eth0" May 13 08:38:59.478780 env[1160]: 2025-05-13 08:38:59.476 [INFO][3943] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:38:59.478780 env[1160]: 2025-05-13 08:38:59.477 [INFO][3936] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" May 13 08:38:59.481571 systemd[1]: run-netns-cni\x2deb01c9d6\x2d1848\x2d1181\x2d02bd\x2d93e8aa02950c.mount: Deactivated successfully. May 13 08:38:59.482857 env[1160]: time="2025-05-13T08:38:59.482803134Z" level=info msg="TearDown network for sandbox \"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\" successfully" May 13 08:38:59.482941 env[1160]: time="2025-05-13T08:38:59.482923020Z" level=info msg="StopPodSandbox for \"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\" returns successfully" May 13 08:38:59.483612 env[1160]: time="2025-05-13T08:38:59.483588995Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-879wp,Uid:bb10d67c-f538-43e5-815f-31e6361dc87a,Namespace:kube-system,Attempt:1,}" May 13 08:38:59.597219 kubelet[1940]: I0513 08:38:59.595792 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-frqhd" podStartSLOduration=48.595775343 podStartE2EDuration="48.595775343s" podCreationTimestamp="2025-05-13 08:38:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 08:38:59.59239351 +0000 UTC m=+53.545513191" watchObservedRunningTime="2025-05-13 08:38:59.595775343 +0000 UTC m=+53.548895024" May 13 08:38:59.623000 audit[3971]: NETFILTER_CFG table=filter:103 family=2 entries=16 op=nft_register_rule pid=3971 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:38:59.623000 audit[3971]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff7e007100 a2=0 a3=7fff7e0070ec items=0 ppid=2066 pid=3971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:59.623000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:38:59.629000 audit[3971]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=3971 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:38:59.629000 audit[3971]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff7e007100 a2=0 a3=0 items=0 ppid=2066 pid=3971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:59.629000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:38:59.643000 audit[3973]: NETFILTER_CFG table=filter:105 family=2 entries=13 op=nft_register_rule pid=3973 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:38:59.643000 audit[3973]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fffbb366fa0 a2=0 a3=7fffbb366f8c items=0 ppid=2066 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:59.643000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:38:59.649000 audit[3973]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=3973 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:38:59.649000 audit[3973]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fffbb366fa0 a2=0 a3=7fffbb366f8c items=0 ppid=2066 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:59.649000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:38:59.759717 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 08:38:59.760168 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliee7024dd1ca: link becomes ready May 13 08:38:59.763123 systemd-networkd[993]: caliee7024dd1ca: Link UP May 13 08:38:59.763322 systemd-networkd[993]: caliee7024dd1ca: Gained carrier May 13 08:38:59.772873 env[1160]: 2025-05-13 08:38:59.548 [INFO][3949] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-eth0 coredns-6f6b679f8f- kube-system bb10d67c-f538-43e5-815f-31e6361dc87a 841 0 2025-05-13 08:38:11 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-7-n-702ca96d1c.novalocal coredns-6f6b679f8f-879wp eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] caliee7024dd1ca [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b" Namespace="kube-system" Pod="coredns-6f6b679f8f-879wp" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-" May 13 08:38:59.772873 env[1160]: 2025-05-13 08:38:59.548 [INFO][3949] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b" Namespace="kube-system" Pod="coredns-6f6b679f8f-879wp" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-eth0" May 13 08:38:59.772873 env[1160]: 2025-05-13 08:38:59.604 [INFO][3964] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b" HandleID="k8s-pod-network.b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-eth0" May 13 08:38:59.772873 env[1160]: 2025-05-13 08:38:59.716 [INFO][3964] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b" HandleID="k8s-pod-network.b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003136c0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-7-n-702ca96d1c.novalocal", "pod":"coredns-6f6b679f8f-879wp", "timestamp":"2025-05-13 08:38:59.604383576 +0000 UTC"}, Hostname:"ci-3510-3-7-n-702ca96d1c.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 08:38:59.772873 env[1160]: 2025-05-13 08:38:59.716 [INFO][3964] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:38:59.772873 env[1160]: 2025-05-13 08:38:59.716 [INFO][3964] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:38:59.772873 env[1160]: 2025-05-13 08:38:59.716 [INFO][3964] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-702ca96d1c.novalocal' May 13 08:38:59.772873 env[1160]: 2025-05-13 08:38:59.719 [INFO][3964] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:59.772873 env[1160]: 2025-05-13 08:38:59.723 [INFO][3964] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:59.772873 env[1160]: 2025-05-13 08:38:59.728 [INFO][3964] ipam/ipam.go 489: Trying affinity for 192.168.120.192/26 host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:59.772873 env[1160]: 2025-05-13 08:38:59.730 [INFO][3964] ipam/ipam.go 155: Attempting to load block cidr=192.168.120.192/26 host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:59.772873 env[1160]: 2025-05-13 08:38:59.732 [INFO][3964] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.120.192/26 host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:59.772873 env[1160]: 2025-05-13 08:38:59.732 [INFO][3964] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.120.192/26 handle="k8s-pod-network.b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:59.772873 env[1160]: 2025-05-13 08:38:59.734 [INFO][3964] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b May 13 08:38:59.772873 env[1160]: 2025-05-13 08:38:59.739 [INFO][3964] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.120.192/26 handle="k8s-pod-network.b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:59.772873 env[1160]: 2025-05-13 08:38:59.746 [INFO][3964] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.120.198/26] block=192.168.120.192/26 handle="k8s-pod-network.b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:59.772873 env[1160]: 2025-05-13 08:38:59.746 [INFO][3964] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.120.198/26] handle="k8s-pod-network.b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b" host="ci-3510-3-7-n-702ca96d1c.novalocal" May 13 08:38:59.772873 env[1160]: 2025-05-13 08:38:59.746 [INFO][3964] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:38:59.772873 env[1160]: 2025-05-13 08:38:59.747 [INFO][3964] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.120.198/26] IPv6=[] ContainerID="b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b" HandleID="k8s-pod-network.b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-eth0" May 13 08:38:59.774232 env[1160]: 2025-05-13 08:38:59.748 [INFO][3949] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b" Namespace="kube-system" Pod="coredns-6f6b679f8f-879wp" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"bb10d67c-f538-43e5-815f-31e6361dc87a", ResourceVersion:"841", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-702ca96d1c.novalocal", ContainerID:"", Pod:"coredns-6f6b679f8f-879wp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.120.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliee7024dd1ca", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:38:59.774232 env[1160]: 2025-05-13 08:38:59.748 [INFO][3949] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.120.198/32] ContainerID="b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b" Namespace="kube-system" Pod="coredns-6f6b679f8f-879wp" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-eth0" May 13 08:38:59.774232 env[1160]: 2025-05-13 08:38:59.748 [INFO][3949] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliee7024dd1ca ContainerID="b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b" Namespace="kube-system" Pod="coredns-6f6b679f8f-879wp" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-eth0" May 13 08:38:59.774232 env[1160]: 2025-05-13 08:38:59.752 [INFO][3949] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b" Namespace="kube-system" Pod="coredns-6f6b679f8f-879wp" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-eth0" May 13 08:38:59.774232 env[1160]: 2025-05-13 08:38:59.752 [INFO][3949] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b" Namespace="kube-system" Pod="coredns-6f6b679f8f-879wp" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"bb10d67c-f538-43e5-815f-31e6361dc87a", ResourceVersion:"841", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-702ca96d1c.novalocal", ContainerID:"b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b", Pod:"coredns-6f6b679f8f-879wp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.120.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliee7024dd1ca", MAC:"c2:91:a8:97:5c:6e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:38:59.774232 env[1160]: 2025-05-13 08:38:59.771 [INFO][3949] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b" Namespace="kube-system" Pod="coredns-6f6b679f8f-879wp" WorkloadEndpoint="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-eth0" May 13 08:38:59.803000 audit[3989]: NETFILTER_CFG table=filter:107 family=2 entries=48 op=nft_register_chain pid=3989 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 08:38:59.803000 audit[3989]: SYSCALL arch=c000003e syscall=46 success=yes exit=23432 a0=3 a1=7fffb5d53e30 a2=0 a3=7fffb5d53e1c items=0 ppid=3430 pid=3989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:59.803000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 08:38:59.814836 env[1160]: time="2025-05-13T08:38:59.814763511Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 08:38:59.815019 env[1160]: time="2025-05-13T08:38:59.814996860Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 08:38:59.815108 env[1160]: time="2025-05-13T08:38:59.815087361Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 08:38:59.815588 env[1160]: time="2025-05-13T08:38:59.815447119Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b pid=3997 runtime=io.containerd.runc.v2 May 13 08:38:59.846530 systemd[1]: Started cri-containerd-b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b.scope. May 13 08:38:59.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.861000 audit: BPF prog-id=189 op=LOAD May 13 08:38:59.861000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.861000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3997 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:59.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232653862386437346166386163366238393063666165633838316565 May 13 08:38:59.861000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.861000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3997 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:59.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232653862386437346166386163366238393063666165633838316565 May 13 08:38:59.862000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.862000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.862000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.862000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.862000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.862000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.862000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.862000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.862000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.862000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.862000 audit: BPF prog-id=190 op=LOAD May 13 08:38:59.862000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c00b0 items=0 ppid=3997 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:59.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232653862386437346166386163366238393063666165633838316565 May 13 08:38:59.862000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.862000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.862000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.862000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.862000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.862000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.862000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.862000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.862000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.862000 audit: BPF prog-id=191 op=LOAD May 13 08:38:59.862000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c00f8 items=0 ppid=3997 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:59.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232653862386437346166386163366238393063666165633838316565 May 13 08:38:59.863000 audit: BPF prog-id=191 op=UNLOAD May 13 08:38:59.863000 audit: BPF prog-id=190 op=UNLOAD May 13 08:38:59.863000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.863000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.863000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.863000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.863000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.863000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.863000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.863000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.863000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.863000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.863000 audit: BPF prog-id=192 op=LOAD May 13 08:38:59.863000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c0508 items=0 ppid=3997 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:59.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232653862386437346166386163366238393063666165633838316565 May 13 08:38:59.904782 env[1160]: time="2025-05-13T08:38:59.904682542Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-879wp,Uid:bb10d67c-f538-43e5-815f-31e6361dc87a,Namespace:kube-system,Attempt:1,} returns sandbox id \"b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b\"" May 13 08:38:59.910700 env[1160]: time="2025-05-13T08:38:59.910658365Z" level=info msg="CreateContainer within sandbox \"b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 13 08:38:59.929532 env[1160]: time="2025-05-13T08:38:59.929455551Z" level=info msg="CreateContainer within sandbox \"b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"9b4b098204ad1aec7a032d4c2384da42a141c082c3446dfbaf9d9e442ae48f96\"" May 13 08:38:59.931258 env[1160]: time="2025-05-13T08:38:59.930137065Z" level=info msg="StartContainer for \"9b4b098204ad1aec7a032d4c2384da42a141c082c3446dfbaf9d9e442ae48f96\"" May 13 08:38:59.966066 systemd[1]: Started cri-containerd-9b4b098204ad1aec7a032d4c2384da42a141c082c3446dfbaf9d9e442ae48f96.scope. May 13 08:38:59.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.984000 audit: BPF prog-id=193 op=LOAD May 13 08:38:59.985000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.985000 audit[4039]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3997 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:59.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962346230393832303461643161656337613033326434633233383464 May 13 08:38:59.985000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.985000 audit[4039]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3997 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:59.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962346230393832303461643161656337613033326434633233383464 May 13 08:38:59.986000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.986000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.986000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.986000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.986000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.986000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.986000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.986000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.986000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.986000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.986000 audit: BPF prog-id=194 op=LOAD May 13 08:38:59.986000 audit[4039]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000234430 items=0 ppid=3997 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:59.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962346230393832303461643161656337613033326434633233383464 May 13 08:38:59.986000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.986000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.986000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.986000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.986000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.986000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.986000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.986000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.986000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.986000 audit: BPF prog-id=195 op=LOAD May 13 08:38:59.986000 audit[4039]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000234478 items=0 ppid=3997 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:59.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962346230393832303461643161656337613033326434633233383464 May 13 08:38:59.987000 audit: BPF prog-id=195 op=UNLOAD May 13 08:38:59.987000 audit: BPF prog-id=194 op=UNLOAD May 13 08:38:59.987000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.987000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.987000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.987000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.987000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.987000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.987000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.987000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.987000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.987000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:38:59.987000 audit: BPF prog-id=196 op=LOAD May 13 08:38:59.987000 audit[4039]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000234888 items=0 ppid=3997 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:38:59.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962346230393832303461643161656337613033326434633233383464 May 13 08:39:00.007611 env[1160]: time="2025-05-13T08:39:00.007573010Z" level=info msg="StartContainer for \"9b4b098204ad1aec7a032d4c2384da42a141c082c3446dfbaf9d9e442ae48f96\" returns successfully" May 13 08:39:00.052636 systemd-networkd[993]: calie1d0a5d698d: Gained IPv6LL May 13 08:39:00.656992 kubelet[1940]: I0513 08:39:00.656920 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-879wp" podStartSLOduration=49.656889897 podStartE2EDuration="49.656889897s" podCreationTimestamp="2025-05-13 08:38:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 08:39:00.614806295 +0000 UTC m=+54.567926027" watchObservedRunningTime="2025-05-13 08:39:00.656889897 +0000 UTC m=+54.610009588" May 13 08:39:00.695355 kernel: kauditd_printk_skb: 293 callbacks suppressed May 13 08:39:00.695457 kernel: audit: type=1325 audit(1747125540.689:1219): table=filter:108 family=2 entries=10 op=nft_register_rule pid=4075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:39:00.689000 audit[4075]: NETFILTER_CFG table=filter:108 family=2 entries=10 op=nft_register_rule pid=4075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:39:00.689000 audit[4075]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd3d5244a0 a2=0 a3=7ffd3d52448c items=0 ppid=2066 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:00.703503 kernel: audit: type=1300 audit(1747125540.689:1219): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd3d5244a0 a2=0 a3=7ffd3d52448c items=0 ppid=2066 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:00.703560 kernel: audit: type=1327 audit(1747125540.689:1219): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:39:00.689000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:39:00.710000 audit[4075]: NETFILTER_CFG table=nat:109 family=2 entries=44 op=nft_register_rule pid=4075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:39:00.710000 audit[4075]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd3d5244a0 a2=0 a3=7ffd3d52448c items=0 ppid=2066 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:00.723835 kernel: audit: type=1325 audit(1747125540.710:1220): table=nat:109 family=2 entries=44 op=nft_register_rule pid=4075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:39:00.723920 kernel: audit: type=1300 audit(1747125540.710:1220): arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd3d5244a0 a2=0 a3=7ffd3d52448c items=0 ppid=2066 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:00.710000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:39:00.728502 kernel: audit: type=1327 audit(1747125540.710:1220): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:39:01.080657 systemd-networkd[993]: caliee7024dd1ca: Gained IPv6LL May 13 08:39:01.081671 env[1160]: time="2025-05-13T08:39:01.081626642Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:39:01.082641 env[1160]: time="2025-05-13T08:39:01.082619632Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:39:01.084626 env[1160]: time="2025-05-13T08:39:01.084605275Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:39:01.089651 env[1160]: time="2025-05-13T08:39:01.089590026Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:39:01.090101 env[1160]: time="2025-05-13T08:39:01.090065181Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 13 08:39:01.101776 env[1160]: time="2025-05-13T08:39:01.101723828Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 13 08:39:01.103325 env[1160]: time="2025-05-13T08:39:01.103275301Z" level=info msg="CreateContainer within sandbox \"d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 08:39:01.140206 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1011565137.mount: Deactivated successfully. May 13 08:39:01.147531 env[1160]: time="2025-05-13T08:39:01.147466103Z" level=info msg="CreateContainer within sandbox \"d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"65cff0bdd2e2655606d08421b27c00722df6705418bc8b8970509650b961f5d2\"" May 13 08:39:01.149783 env[1160]: time="2025-05-13T08:39:01.149755557Z" level=info msg="StartContainer for \"65cff0bdd2e2655606d08421b27c00722df6705418bc8b8970509650b961f5d2\"" May 13 08:39:01.174728 systemd[1]: Started cri-containerd-65cff0bdd2e2655606d08421b27c00722df6705418bc8b8970509650b961f5d2.scope. May 13 08:39:01.200561 kernel: audit: type=1400 audit(1747125541.190:1221): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.200679 kernel: audit: type=1400 audit(1747125541.190:1222): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.200709 kernel: audit: type=1400 audit(1747125541.190:1223): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208838 kernel: audit: type=1400 audit(1747125541.190:1224): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.203000 audit: BPF prog-id=197 op=LOAD May 13 08:39:01.208000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3312 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:01.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635636666306264643265323635353630366430383432316232376330 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3312 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:01.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635636666306264643265323635353630366430383432316232376330 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit: BPF prog-id=198 op=LOAD May 13 08:39:01.208000 audit[4083]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00031f100 items=0 ppid=3312 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:01.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635636666306264643265323635353630366430383432316232376330 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit: BPF prog-id=199 op=LOAD May 13 08:39:01.208000 audit[4083]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00031f148 items=0 ppid=3312 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:01.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635636666306264643265323635353630366430383432316232376330 May 13 08:39:01.208000 audit: BPF prog-id=199 op=UNLOAD May 13 08:39:01.208000 audit: BPF prog-id=198 op=UNLOAD May 13 08:39:01.208000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { perfmon } for pid=4083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit[4083]: AVC avc: denied { bpf } for pid=4083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.208000 audit: BPF prog-id=200 op=LOAD May 13 08:39:01.208000 audit[4083]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00031f558 items=0 ppid=3312 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:01.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635636666306264643265323635353630366430383432316232376330 May 13 08:39:01.344378 env[1160]: time="2025-05-13T08:39:01.344246236Z" level=info msg="StartContainer for \"65cff0bdd2e2655606d08421b27c00722df6705418bc8b8970509650b961f5d2\" returns successfully" May 13 08:39:01.461441 systemd[1]: run-containerd-runc-k8s.io-65cff0bdd2e2655606d08421b27c00722df6705418bc8b8970509650b961f5d2-runc.Nuovow.mount: Deactivated successfully. May 13 08:39:01.632362 env[1160]: time="2025-05-13T08:39:01.631467533Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:39:01.634749 env[1160]: time="2025-05-13T08:39:01.634702768Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:39:01.639609 env[1160]: time="2025-05-13T08:39:01.639589526Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:39:01.643619 env[1160]: time="2025-05-13T08:39:01.643596375Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:39:01.644712 env[1160]: time="2025-05-13T08:39:01.644684626Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 13 08:39:01.648100 env[1160]: time="2025-05-13T08:39:01.648078570Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 13 08:39:01.651343 env[1160]: time="2025-05-13T08:39:01.651314708Z" level=info msg="CreateContainer within sandbox \"52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 08:39:01.676788 env[1160]: time="2025-05-13T08:39:01.676748279Z" level=info msg="CreateContainer within sandbox \"52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"b9e4a24621d62833891f81a3fe760c4eabf09e90d863eb70a66089b194166e18\"" May 13 08:39:01.677683 env[1160]: time="2025-05-13T08:39:01.677660758Z" level=info msg="StartContainer for \"b9e4a24621d62833891f81a3fe760c4eabf09e90d863eb70a66089b194166e18\"" May 13 08:39:01.690000 audit[4113]: NETFILTER_CFG table=filter:110 family=2 entries=10 op=nft_register_rule pid=4113 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:39:01.690000 audit[4113]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffdc19e1b30 a2=0 a3=7ffdc19e1b1c items=0 ppid=2066 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:01.690000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:39:01.708818 systemd[1]: Started cri-containerd-b9e4a24621d62833891f81a3fe760c4eabf09e90d863eb70a66089b194166e18.scope. May 13 08:39:01.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.791000 audit: BPF prog-id=201 op=LOAD May 13 08:39:01.792000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.792000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3356 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:01.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239653461323436323164363238333338393166383161336665373630 May 13 08:39:01.793000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.793000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3356 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:01.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239653461323436323164363238333338393166383161336665373630 May 13 08:39:01.793000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.793000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.793000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.793000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.793000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.793000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.793000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.793000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.793000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.793000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.793000 audit: BPF prog-id=202 op=LOAD May 13 08:39:01.793000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002fbdc0 items=0 ppid=3356 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:01.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239653461323436323164363238333338393166383161336665373630 May 13 08:39:01.793000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.793000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.793000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.793000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.793000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.793000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.793000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.793000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.793000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.793000 audit: BPF prog-id=203 op=LOAD May 13 08:39:01.793000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002fbe08 items=0 ppid=3356 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:01.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239653461323436323164363238333338393166383161336665373630 May 13 08:39:01.794000 audit: BPF prog-id=203 op=UNLOAD May 13 08:39:01.794000 audit: BPF prog-id=202 op=UNLOAD May 13 08:39:01.794000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.794000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.794000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.794000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.794000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.794000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.794000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.794000 audit[4120]: AVC avc: denied { perfmon } for pid=4120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.794000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.794000 audit[4120]: AVC avc: denied { bpf } for pid=4120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:01.794000 audit: BPF prog-id=204 op=LOAD May 13 08:39:01.794000 audit[4120]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003da218 items=0 ppid=3356 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:01.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239653461323436323164363238333338393166383161336665373630 May 13 08:39:01.805000 audit[4113]: NETFILTER_CFG table=nat:111 family=2 entries=56 op=nft_register_chain pid=4113 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:39:01.805000 audit[4113]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffdc19e1b30 a2=0 a3=7ffdc19e1b1c items=0 ppid=2066 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:01.805000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:39:01.835468 env[1160]: time="2025-05-13T08:39:01.835430138Z" level=info msg="StartContainer for \"b9e4a24621d62833891f81a3fe760c4eabf09e90d863eb70a66089b194166e18\" returns successfully" May 13 08:39:01.899000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:39:01.899000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001ff9340 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:39:01.899000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:39:01.899000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:39:01.899000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002748600 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:39:01.899000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:39:01.962774 kubelet[1940]: I0513 08:39:01.962719 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6dc689f579-kgtzs" podStartSLOduration=32.087904545 podStartE2EDuration="43.962702759s" podCreationTimestamp="2025-05-13 08:38:18 +0000 UTC" firstStartedPulling="2025-05-13 08:38:49.224554476 +0000 UTC m=+43.177674167" lastFinishedPulling="2025-05-13 08:39:01.0993527 +0000 UTC m=+55.052472381" observedRunningTime="2025-05-13 08:39:01.64238848 +0000 UTC m=+55.595508161" watchObservedRunningTime="2025-05-13 08:39:01.962702759 +0000 UTC m=+55.915822440" May 13 08:39:02.383000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:39:02.383000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00aa9b860 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:39:02.384000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7295 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:39:02.384000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00aa9b890 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:39:02.384000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:39:02.384000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:39:02.384000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00a4c0740 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:39:02.384000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:39:02.383000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:39:02.394000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7301 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:39:02.394000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00aa38990 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:39:02.394000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:39:02.461649 systemd[1]: run-containerd-runc-k8s.io-b9e4a24621d62833891f81a3fe760c4eabf09e90d863eb70a66089b194166e18-runc.9Wgj3Q.mount: Deactivated successfully. May 13 08:39:02.470000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:39:02.470000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:39:02.470000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0066b3580 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:39:02.470000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:39:02.470000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00ab08690 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:39:02.470000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:39:02.594297 kubelet[1940]: I0513 08:39:02.594273 1940 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 08:39:02.629000 audit[4172]: NETFILTER_CFG table=filter:112 family=2 entries=10 op=nft_register_rule pid=4172 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:39:02.629000 audit[4172]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffebe988a60 a2=0 a3=7ffebe988a4c items=0 ppid=2066 pid=4172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:02.629000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:39:02.633000 audit[4172]: NETFILTER_CFG table=nat:113 family=2 entries=20 op=nft_register_rule pid=4172 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:39:02.633000 audit[4172]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffebe988a60 a2=0 a3=7ffebe988a4c items=0 ppid=2066 pid=4172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:02.633000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:39:02.720000 audit[4093]: AVC avc: denied { watch } for pid=4093 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_08_38_35.3782379492/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c400,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c400,c861 tclass=file permissive=0 May 13 08:39:02.720000 audit[4093]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00153f2c0 a2=fc6 a3=0 items=0 ppid=3312 pid=4093 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c400,c861 key=(null) May 13 08:39:02.720000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 08:39:03.134000 audit[4131]: AVC avc: denied { watch } for pid=4131 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_08_38_35.775369572/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c241 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c43,c241 tclass=file permissive=0 May 13 08:39:03.134000 audit[4131]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000770ea0 a2=fc6 a3=0 items=0 ppid=3356 pid=4131 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c241 key=(null) May 13 08:39:03.134000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 08:39:03.171154 kubelet[1940]: I0513 08:39:03.171093 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6dc689f579-hm7sz" podStartSLOduration=32.79949025 podStartE2EDuration="45.171074744s" podCreationTimestamp="2025-05-13 08:38:18 +0000 UTC" firstStartedPulling="2025-05-13 08:38:49.275732141 +0000 UTC m=+43.228851822" lastFinishedPulling="2025-05-13 08:39:01.647316585 +0000 UTC m=+55.600436316" observedRunningTime="2025-05-13 08:39:02.61114231 +0000 UTC m=+56.564261991" watchObservedRunningTime="2025-05-13 08:39:03.171074744 +0000 UTC m=+57.124194425" May 13 08:39:03.646000 audit[4175]: NETFILTER_CFG table=filter:114 family=2 entries=9 op=nft_register_rule pid=4175 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:39:03.646000 audit[4175]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd3726f520 a2=0 a3=7ffd3726f50c items=0 ppid=2066 pid=4175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:03.646000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:39:03.651000 audit[4175]: NETFILTER_CFG table=nat:115 family=2 entries=27 op=nft_register_chain pid=4175 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:39:03.651000 audit[4175]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd3726f520 a2=0 a3=7ffd3726f50c items=0 ppid=2066 pid=4175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:03.651000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:39:03.898516 env[1160]: time="2025-05-13T08:39:03.898386780Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:39:03.901823 env[1160]: time="2025-05-13T08:39:03.901780884Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:39:03.904515 env[1160]: time="2025-05-13T08:39:03.904463487Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:39:03.907693 env[1160]: time="2025-05-13T08:39:03.907374240Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:39:03.908188 env[1160]: time="2025-05-13T08:39:03.908151906Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 13 08:39:03.913191 env[1160]: time="2025-05-13T08:39:03.913150331Z" level=info msg="CreateContainer within sandbox \"ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 13 08:39:03.933530 env[1160]: time="2025-05-13T08:39:03.933456452Z" level=info msg="CreateContainer within sandbox \"ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"5457d232cefd092ac50b551784b06f4c08b225e1d274a68c862dcc2798a23c2f\"" May 13 08:39:03.934431 env[1160]: time="2025-05-13T08:39:03.934401382Z" level=info msg="StartContainer for \"5457d232cefd092ac50b551784b06f4c08b225e1d274a68c862dcc2798a23c2f\"" May 13 08:39:03.970846 systemd[1]: Started cri-containerd-5457d232cefd092ac50b551784b06f4c08b225e1d274a68c862dcc2798a23c2f.scope. May 13 08:39:04.012000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe535f71c68 items=0 ppid=3677 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:04.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534353764323332636566643039326163353062353531373834623036 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit: BPF prog-id=205 op=LOAD May 13 08:39:04.012000 audit[4184]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000985d8 items=0 ppid=3677 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:04.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534353764323332636566643039326163353062353531373834623036 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit: BPF prog-id=206 op=LOAD May 13 08:39:04.012000 audit[4184]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000098628 items=0 ppid=3677 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:04.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534353764323332636566643039326163353062353531373834623036 May 13 08:39:04.012000 audit: BPF prog-id=206 op=UNLOAD May 13 08:39:04.012000 audit: BPF prog-id=205 op=UNLOAD May 13 08:39:04.012000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { perfmon } for pid=4184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit[4184]: AVC avc: denied { bpf } for pid=4184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:04.012000 audit: BPF prog-id=207 op=LOAD May 13 08:39:04.012000 audit[4184]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000986b8 items=0 ppid=3677 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:04.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534353764323332636566643039326163353062353531373834623036 May 13 08:39:04.030168 env[1160]: time="2025-05-13T08:39:04.030122567Z" level=info msg="StartContainer for \"5457d232cefd092ac50b551784b06f4c08b225e1d274a68c862dcc2798a23c2f\" returns successfully" May 13 08:39:04.031845 env[1160]: time="2025-05-13T08:39:04.031816498Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 13 08:39:04.924968 systemd[1]: run-containerd-runc-k8s.io-5457d232cefd092ac50b551784b06f4c08b225e1d274a68c862dcc2798a23c2f-runc.ZowG8t.mount: Deactivated successfully. May 13 08:39:06.354503 env[1160]: time="2025-05-13T08:39:06.354447812Z" level=info msg="StopPodSandbox for \"b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8\"" May 13 08:39:06.513562 env[1160]: 2025-05-13 08:39:06.450 [WARNING][4229] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-eth0", GenerateName:"calico-apiserver-6dc689f579-", Namespace:"calico-apiserver", SelfLink:"", UID:"1770c4b6-19bf-4e86-b869-5eebd27cd9cc", ResourceVersion:"884", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 38, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6dc689f579", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-702ca96d1c.novalocal", ContainerID:"52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5", Pod:"calico-apiserver-6dc689f579-hm7sz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.120.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7549da1169e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:39:06.513562 env[1160]: 2025-05-13 08:39:06.451 [INFO][4229] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" May 13 08:39:06.513562 env[1160]: 2025-05-13 08:39:06.451 [INFO][4229] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" iface="eth0" netns="" May 13 08:39:06.513562 env[1160]: 2025-05-13 08:39:06.451 [INFO][4229] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" May 13 08:39:06.513562 env[1160]: 2025-05-13 08:39:06.451 [INFO][4229] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" May 13 08:39:06.513562 env[1160]: 2025-05-13 08:39:06.496 [INFO][4236] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" HandleID="k8s-pod-network.b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-eth0" May 13 08:39:06.513562 env[1160]: 2025-05-13 08:39:06.496 [INFO][4236] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:39:06.513562 env[1160]: 2025-05-13 08:39:06.497 [INFO][4236] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:39:06.513562 env[1160]: 2025-05-13 08:39:06.508 [WARNING][4236] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" HandleID="k8s-pod-network.b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-eth0" May 13 08:39:06.513562 env[1160]: 2025-05-13 08:39:06.508 [INFO][4236] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" HandleID="k8s-pod-network.b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-eth0" May 13 08:39:06.513562 env[1160]: 2025-05-13 08:39:06.511 [INFO][4236] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:39:06.513562 env[1160]: 2025-05-13 08:39:06.512 [INFO][4229] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" May 13 08:39:06.514162 env[1160]: time="2025-05-13T08:39:06.514129610Z" level=info msg="TearDown network for sandbox \"b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8\" successfully" May 13 08:39:06.514234 env[1160]: time="2025-05-13T08:39:06.514216013Z" level=info msg="StopPodSandbox for \"b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8\" returns successfully" May 13 08:39:06.514898 env[1160]: time="2025-05-13T08:39:06.514875134Z" level=info msg="RemovePodSandbox for \"b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8\"" May 13 08:39:06.515009 env[1160]: time="2025-05-13T08:39:06.514972037Z" level=info msg="Forcibly stopping sandbox \"b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8\"" May 13 08:39:06.687546 env[1160]: 2025-05-13 08:39:06.616 [WARNING][4255] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-eth0", GenerateName:"calico-apiserver-6dc689f579-", Namespace:"calico-apiserver", SelfLink:"", UID:"1770c4b6-19bf-4e86-b869-5eebd27cd9cc", ResourceVersion:"884", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 38, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6dc689f579", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-702ca96d1c.novalocal", ContainerID:"52b9f439344c4b7e655db0b1410a94bcbaedea832480c477667d46e64ee113b5", Pod:"calico-apiserver-6dc689f579-hm7sz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.120.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7549da1169e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:39:06.687546 env[1160]: 2025-05-13 08:39:06.616 [INFO][4255] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" May 13 08:39:06.687546 env[1160]: 2025-05-13 08:39:06.616 [INFO][4255] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" iface="eth0" netns="" May 13 08:39:06.687546 env[1160]: 2025-05-13 08:39:06.617 [INFO][4255] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" May 13 08:39:06.687546 env[1160]: 2025-05-13 08:39:06.617 [INFO][4255] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" May 13 08:39:06.687546 env[1160]: 2025-05-13 08:39:06.671 [INFO][4262] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" HandleID="k8s-pod-network.b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-eth0" May 13 08:39:06.687546 env[1160]: 2025-05-13 08:39:06.672 [INFO][4262] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:39:06.687546 env[1160]: 2025-05-13 08:39:06.673 [INFO][4262] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:39:06.687546 env[1160]: 2025-05-13 08:39:06.682 [WARNING][4262] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" HandleID="k8s-pod-network.b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-eth0" May 13 08:39:06.687546 env[1160]: 2025-05-13 08:39:06.682 [INFO][4262] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" HandleID="k8s-pod-network.b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--hm7sz-eth0" May 13 08:39:06.687546 env[1160]: 2025-05-13 08:39:06.684 [INFO][4262] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:39:06.687546 env[1160]: 2025-05-13 08:39:06.685 [INFO][4255] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8" May 13 08:39:06.688193 env[1160]: time="2025-05-13T08:39:06.688159377Z" level=info msg="TearDown network for sandbox \"b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8\" successfully" May 13 08:39:06.695129 env[1160]: time="2025-05-13T08:39:06.695100778Z" level=info msg="RemovePodSandbox \"b7b3fd1a97b10d0c196c886129691cdda515070ecda6d353e6ce62b430d858d8\" returns successfully" May 13 08:39:06.695668 env[1160]: time="2025-05-13T08:39:06.695648320Z" level=info msg="StopPodSandbox for \"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\"" May 13 08:39:06.790521 env[1160]: time="2025-05-13T08:39:06.790422800Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:39:06.791934 env[1160]: time="2025-05-13T08:39:06.791912735Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:39:06.794927 env[1160]: time="2025-05-13T08:39:06.794887657Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:39:06.799663 env[1160]: time="2025-05-13T08:39:06.799623295Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:39:06.800722 env[1160]: time="2025-05-13T08:39:06.800694582Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 13 08:39:06.805837 env[1160]: time="2025-05-13T08:39:06.805800257Z" level=info msg="CreateContainer within sandbox \"ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 13 08:39:06.828519 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2048878086.mount: Deactivated successfully. May 13 08:39:06.837613 env[1160]: time="2025-05-13T08:39:06.837577287Z" level=info msg="CreateContainer within sandbox \"ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"9e1e2d54b192d56b2aa799a07fd0612a0851f1e843949eadd85a1388f898d414\"" May 13 08:39:06.838446 env[1160]: time="2025-05-13T08:39:06.838424843Z" level=info msg="StartContainer for \"9e1e2d54b192d56b2aa799a07fd0612a0851f1e843949eadd85a1388f898d414\"" May 13 08:39:06.887919 systemd[1]: Started cri-containerd-9e1e2d54b192d56b2aa799a07fd0612a0851f1e843949eadd85a1388f898d414.scope. May 13 08:39:06.899555 env[1160]: 2025-05-13 08:39:06.799 [WARNING][4282] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"ad79d4a2-2f47-4184-9900-a632651cccb9", ResourceVersion:"845", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-702ca96d1c.novalocal", ContainerID:"7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707", Pod:"coredns-6f6b679f8f-frqhd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.120.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie1d0a5d698d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:39:06.899555 env[1160]: 2025-05-13 08:39:06.800 [INFO][4282] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" May 13 08:39:06.899555 env[1160]: 2025-05-13 08:39:06.800 [INFO][4282] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" iface="eth0" netns="" May 13 08:39:06.899555 env[1160]: 2025-05-13 08:39:06.800 [INFO][4282] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" May 13 08:39:06.899555 env[1160]: 2025-05-13 08:39:06.800 [INFO][4282] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" May 13 08:39:06.899555 env[1160]: 2025-05-13 08:39:06.855 [INFO][4289] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" HandleID="k8s-pod-network.0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-eth0" May 13 08:39:06.899555 env[1160]: 2025-05-13 08:39:06.855 [INFO][4289] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:39:06.899555 env[1160]: 2025-05-13 08:39:06.855 [INFO][4289] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:39:06.899555 env[1160]: 2025-05-13 08:39:06.889 [WARNING][4289] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" HandleID="k8s-pod-network.0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-eth0" May 13 08:39:06.899555 env[1160]: 2025-05-13 08:39:06.889 [INFO][4289] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" HandleID="k8s-pod-network.0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-eth0" May 13 08:39:06.899555 env[1160]: 2025-05-13 08:39:06.897 [INFO][4289] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:39:06.899555 env[1160]: 2025-05-13 08:39:06.898 [INFO][4282] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" May 13 08:39:06.900137 env[1160]: time="2025-05-13T08:39:06.899603328Z" level=info msg="TearDown network for sandbox \"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\" successfully" May 13 08:39:06.900137 env[1160]: time="2025-05-13T08:39:06.899645128Z" level=info msg="StopPodSandbox for \"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\" returns successfully" May 13 08:39:06.900707 env[1160]: time="2025-05-13T08:39:06.900670758Z" level=info msg="RemovePodSandbox for \"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\"" May 13 08:39:06.900777 env[1160]: time="2025-05-13T08:39:06.900712678Z" level=info msg="Forcibly stopping sandbox \"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\"" May 13 08:39:06.916856 kernel: kauditd_printk_skb: 201 callbacks suppressed May 13 08:39:06.916966 kernel: audit: type=1400 audit(1747125546.909:1279): avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.924667 kernel: audit: type=1300 audit(1747125546.909:1279): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f469818d968 items=0 ppid=3677 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:06.909000 audit[4302]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f469818d968 items=0 ppid=3677 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:06.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965316532643534623139326435366232616137393961303766643036 May 13 08:39:06.935372 kernel: audit: type=1327 audit(1747125546.909:1279): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965316532643534623139326435366232616137393961303766643036 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.947601 kernel: audit: type=1400 audit(1747125546.909:1280): avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.947666 kernel: audit: type=1400 audit(1747125546.909:1280): avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.957547 kernel: audit: type=1400 audit(1747125546.909:1280): avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.966940 kernel: audit: type=1400 audit(1747125546.909:1280): avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.973720 kernel: audit: type=1400 audit(1747125546.909:1280): avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.981544 kernel: audit: type=1400 audit(1747125546.909:1280): avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.987346 kernel: audit: type=1400 audit(1747125546.909:1280): avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.990093 env[1160]: time="2025-05-13T08:39:06.990029321Z" level=info msg="StartContainer for \"9e1e2d54b192d56b2aa799a07fd0612a0851f1e843949eadd85a1388f898d414\" returns successfully" May 13 08:39:06.909000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit: BPF prog-id=208 op=LOAD May 13 08:39:06.909000 audit[4302]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003027b8 items=0 ppid=3677 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:06.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965316532643534623139326435366232616137393961303766643036 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit: BPF prog-id=209 op=LOAD May 13 08:39:06.909000 audit[4302]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000302808 items=0 ppid=3677 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:06.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965316532643534623139326435366232616137393961303766643036 May 13 08:39:06.909000 audit: BPF prog-id=209 op=UNLOAD May 13 08:39:06.909000 audit: BPF prog-id=208 op=UNLOAD May 13 08:39:06.909000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:39:06.909000 audit: BPF prog-id=210 op=LOAD May 13 08:39:06.909000 audit[4302]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000302898 items=0 ppid=3677 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:06.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965316532643534623139326435366232616137393961303766643036 May 13 08:39:07.038729 env[1160]: 2025-05-13 08:39:06.988 [WARNING][4336] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"ad79d4a2-2f47-4184-9900-a632651cccb9", ResourceVersion:"845", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-702ca96d1c.novalocal", ContainerID:"7880ac6d18d31dd8b5c480860df121db4523fd5f376737fd2834254ced4bc707", Pod:"coredns-6f6b679f8f-frqhd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.120.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie1d0a5d698d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:39:07.038729 env[1160]: 2025-05-13 08:39:06.988 [INFO][4336] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" May 13 08:39:07.038729 env[1160]: 2025-05-13 08:39:06.988 [INFO][4336] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" iface="eth0" netns="" May 13 08:39:07.038729 env[1160]: 2025-05-13 08:39:06.988 [INFO][4336] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" May 13 08:39:07.038729 env[1160]: 2025-05-13 08:39:06.988 [INFO][4336] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" May 13 08:39:07.038729 env[1160]: 2025-05-13 08:39:07.022 [INFO][4351] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" HandleID="k8s-pod-network.0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-eth0" May 13 08:39:07.038729 env[1160]: 2025-05-13 08:39:07.022 [INFO][4351] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:39:07.038729 env[1160]: 2025-05-13 08:39:07.022 [INFO][4351] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:39:07.038729 env[1160]: 2025-05-13 08:39:07.035 [WARNING][4351] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" HandleID="k8s-pod-network.0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-eth0" May 13 08:39:07.038729 env[1160]: 2025-05-13 08:39:07.035 [INFO][4351] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" HandleID="k8s-pod-network.0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--frqhd-eth0" May 13 08:39:07.038729 env[1160]: 2025-05-13 08:39:07.036 [INFO][4351] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:39:07.038729 env[1160]: 2025-05-13 08:39:07.037 [INFO][4336] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5" May 13 08:39:07.039253 env[1160]: time="2025-05-13T08:39:07.038760409Z" level=info msg="TearDown network for sandbox \"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\" successfully" May 13 08:39:07.045226 env[1160]: time="2025-05-13T08:39:07.045184385Z" level=info msg="RemovePodSandbox \"0d2a2f1b9771c94024b9365013577417ee2c533a0f7edd51e78029f02e778cf5\" returns successfully" May 13 08:39:07.045825 env[1160]: time="2025-05-13T08:39:07.045799463Z" level=info msg="StopPodSandbox for \"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\"" May 13 08:39:07.133353 env[1160]: 2025-05-13 08:39:07.087 [WARNING][4373] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"bb10d67c-f538-43e5-815f-31e6361dc87a", ResourceVersion:"862", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-702ca96d1c.novalocal", ContainerID:"b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b", Pod:"coredns-6f6b679f8f-879wp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.120.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliee7024dd1ca", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:39:07.133353 env[1160]: 2025-05-13 08:39:07.087 [INFO][4373] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" May 13 08:39:07.133353 env[1160]: 2025-05-13 08:39:07.087 [INFO][4373] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" iface="eth0" netns="" May 13 08:39:07.133353 env[1160]: 2025-05-13 08:39:07.087 [INFO][4373] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" May 13 08:39:07.133353 env[1160]: 2025-05-13 08:39:07.088 [INFO][4373] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" May 13 08:39:07.133353 env[1160]: 2025-05-13 08:39:07.115 [INFO][4380] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" HandleID="k8s-pod-network.e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-eth0" May 13 08:39:07.133353 env[1160]: 2025-05-13 08:39:07.115 [INFO][4380] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:39:07.133353 env[1160]: 2025-05-13 08:39:07.115 [INFO][4380] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:39:07.133353 env[1160]: 2025-05-13 08:39:07.126 [WARNING][4380] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" HandleID="k8s-pod-network.e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-eth0" May 13 08:39:07.133353 env[1160]: 2025-05-13 08:39:07.126 [INFO][4380] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" HandleID="k8s-pod-network.e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-eth0" May 13 08:39:07.133353 env[1160]: 2025-05-13 08:39:07.128 [INFO][4380] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:39:07.133353 env[1160]: 2025-05-13 08:39:07.129 [INFO][4373] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" May 13 08:39:07.133974 env[1160]: time="2025-05-13T08:39:07.133928603Z" level=info msg="TearDown network for sandbox \"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\" successfully" May 13 08:39:07.134058 env[1160]: time="2025-05-13T08:39:07.134039372Z" level=info msg="StopPodSandbox for \"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\" returns successfully" May 13 08:39:07.134694 env[1160]: time="2025-05-13T08:39:07.134650994Z" level=info msg="RemovePodSandbox for \"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\"" May 13 08:39:07.134765 env[1160]: time="2025-05-13T08:39:07.134695547Z" level=info msg="Forcibly stopping sandbox \"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\"" May 13 08:39:07.234418 env[1160]: 2025-05-13 08:39:07.184 [WARNING][4400] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"bb10d67c-f538-43e5-815f-31e6361dc87a", ResourceVersion:"862", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 38, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-702ca96d1c.novalocal", ContainerID:"b2e8b8d74af8ac6b890cfaec881eeb4192ec4cc99f723d3483c654ce93112c2b", Pod:"coredns-6f6b679f8f-879wp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.120.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliee7024dd1ca", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:39:07.234418 env[1160]: 2025-05-13 08:39:07.184 [INFO][4400] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" May 13 08:39:07.234418 env[1160]: 2025-05-13 08:39:07.184 [INFO][4400] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" iface="eth0" netns="" May 13 08:39:07.234418 env[1160]: 2025-05-13 08:39:07.184 [INFO][4400] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" May 13 08:39:07.234418 env[1160]: 2025-05-13 08:39:07.184 [INFO][4400] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" May 13 08:39:07.234418 env[1160]: 2025-05-13 08:39:07.223 [INFO][4407] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" HandleID="k8s-pod-network.e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-eth0" May 13 08:39:07.234418 env[1160]: 2025-05-13 08:39:07.223 [INFO][4407] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:39:07.234418 env[1160]: 2025-05-13 08:39:07.223 [INFO][4407] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:39:07.234418 env[1160]: 2025-05-13 08:39:07.230 [WARNING][4407] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" HandleID="k8s-pod-network.e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-eth0" May 13 08:39:07.234418 env[1160]: 2025-05-13 08:39:07.230 [INFO][4407] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" HandleID="k8s-pod-network.e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-coredns--6f6b679f8f--879wp-eth0" May 13 08:39:07.234418 env[1160]: 2025-05-13 08:39:07.232 [INFO][4407] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:39:07.234418 env[1160]: 2025-05-13 08:39:07.233 [INFO][4400] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2" May 13 08:39:07.234930 env[1160]: time="2025-05-13T08:39:07.234440840Z" level=info msg="TearDown network for sandbox \"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\" successfully" May 13 08:39:07.245782 env[1160]: time="2025-05-13T08:39:07.245743622Z" level=info msg="RemovePodSandbox \"e0c3d29857160809fb5cc8058a743fcad32ccd0b648da9480ef091b72147a6a2\" returns successfully" May 13 08:39:07.246462 env[1160]: time="2025-05-13T08:39:07.246430876Z" level=info msg="StopPodSandbox for \"981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3\"" May 13 08:39:07.351027 env[1160]: 2025-05-13 08:39:07.306 [WARNING][4427] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"14293fd4-c5b5-4b77-9cbd-af7d79ab2352", ResourceVersion:"805", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 38, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-702ca96d1c.novalocal", ContainerID:"ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a", Pod:"csi-node-driver-wnsw4", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.120.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib81e4db3acd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:39:07.351027 env[1160]: 2025-05-13 08:39:07.306 [INFO][4427] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" May 13 08:39:07.351027 env[1160]: 2025-05-13 08:39:07.306 [INFO][4427] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" iface="eth0" netns="" May 13 08:39:07.351027 env[1160]: 2025-05-13 08:39:07.306 [INFO][4427] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" May 13 08:39:07.351027 env[1160]: 2025-05-13 08:39:07.306 [INFO][4427] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" May 13 08:39:07.351027 env[1160]: 2025-05-13 08:39:07.339 [INFO][4434] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" HandleID="k8s-pod-network.981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-eth0" May 13 08:39:07.351027 env[1160]: 2025-05-13 08:39:07.339 [INFO][4434] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:39:07.351027 env[1160]: 2025-05-13 08:39:07.340 [INFO][4434] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:39:07.351027 env[1160]: 2025-05-13 08:39:07.347 [WARNING][4434] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" HandleID="k8s-pod-network.981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-eth0" May 13 08:39:07.351027 env[1160]: 2025-05-13 08:39:07.347 [INFO][4434] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" HandleID="k8s-pod-network.981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-eth0" May 13 08:39:07.351027 env[1160]: 2025-05-13 08:39:07.348 [INFO][4434] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:39:07.351027 env[1160]: 2025-05-13 08:39:07.349 [INFO][4427] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" May 13 08:39:07.351598 env[1160]: time="2025-05-13T08:39:07.351556880Z" level=info msg="TearDown network for sandbox \"981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3\" successfully" May 13 08:39:07.351683 env[1160]: time="2025-05-13T08:39:07.351664993Z" level=info msg="StopPodSandbox for \"981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3\" returns successfully" May 13 08:39:07.352271 env[1160]: time="2025-05-13T08:39:07.352240407Z" level=info msg="RemovePodSandbox for \"981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3\"" May 13 08:39:07.352338 env[1160]: time="2025-05-13T08:39:07.352279871Z" level=info msg="Forcibly stopping sandbox \"981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3\"" May 13 08:39:07.455691 env[1160]: 2025-05-13 08:39:07.394 [WARNING][4452] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"14293fd4-c5b5-4b77-9cbd-af7d79ab2352", ResourceVersion:"805", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 38, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-702ca96d1c.novalocal", ContainerID:"ce8189d498398a0af9f78bf15eda3e1ff2479027672189bce66a58dfc160e75a", Pod:"csi-node-driver-wnsw4", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.120.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib81e4db3acd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:39:07.455691 env[1160]: 2025-05-13 08:39:07.395 [INFO][4452] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" May 13 08:39:07.455691 env[1160]: 2025-05-13 08:39:07.395 [INFO][4452] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" iface="eth0" netns="" May 13 08:39:07.455691 env[1160]: 2025-05-13 08:39:07.395 [INFO][4452] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" May 13 08:39:07.455691 env[1160]: 2025-05-13 08:39:07.395 [INFO][4452] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" May 13 08:39:07.455691 env[1160]: 2025-05-13 08:39:07.429 [INFO][4459] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" HandleID="k8s-pod-network.981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-eth0" May 13 08:39:07.455691 env[1160]: 2025-05-13 08:39:07.429 [INFO][4459] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:39:07.455691 env[1160]: 2025-05-13 08:39:07.429 [INFO][4459] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:39:07.455691 env[1160]: 2025-05-13 08:39:07.451 [WARNING][4459] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" HandleID="k8s-pod-network.981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-eth0" May 13 08:39:07.455691 env[1160]: 2025-05-13 08:39:07.451 [INFO][4459] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" HandleID="k8s-pod-network.981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-csi--node--driver--wnsw4-eth0" May 13 08:39:07.455691 env[1160]: 2025-05-13 08:39:07.453 [INFO][4459] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:39:07.455691 env[1160]: 2025-05-13 08:39:07.454 [INFO][4452] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3" May 13 08:39:07.456452 env[1160]: time="2025-05-13T08:39:07.455725360Z" level=info msg="TearDown network for sandbox \"981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3\" successfully" May 13 08:39:07.461158 env[1160]: time="2025-05-13T08:39:07.460829571Z" level=info msg="RemovePodSandbox \"981f51a3e3239de7e429d8f83cca80dc99e43b570b81a46084d6727d56130ca3\" returns successfully" May 13 08:39:07.462590 env[1160]: time="2025-05-13T08:39:07.462557855Z" level=info msg="StopPodSandbox for \"c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae\"" May 13 08:39:07.485273 kubelet[1940]: I0513 08:39:07.485185 1940 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 13 08:39:07.485273 kubelet[1940]: I0513 08:39:07.485247 1940 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 13 08:39:07.570285 env[1160]: 2025-05-13 08:39:07.524 [WARNING][4479] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-eth0", GenerateName:"calico-kube-controllers-7685b4f9bb-", Namespace:"calico-system", SelfLink:"", UID:"ee88de73-bb38-4d28-8c79-de16aa79a964", ResourceVersion:"822", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 38, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7685b4f9bb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-702ca96d1c.novalocal", ContainerID:"0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a", Pod:"calico-kube-controllers-7685b4f9bb-gqlkt", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.120.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7b025663018", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:39:07.570285 env[1160]: 2025-05-13 08:39:07.524 [INFO][4479] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" May 13 08:39:07.570285 env[1160]: 2025-05-13 08:39:07.524 [INFO][4479] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" iface="eth0" netns="" May 13 08:39:07.570285 env[1160]: 2025-05-13 08:39:07.524 [INFO][4479] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" May 13 08:39:07.570285 env[1160]: 2025-05-13 08:39:07.524 [INFO][4479] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" May 13 08:39:07.570285 env[1160]: 2025-05-13 08:39:07.557 [INFO][4486] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" HandleID="k8s-pod-network.c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-eth0" May 13 08:39:07.570285 env[1160]: 2025-05-13 08:39:07.557 [INFO][4486] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:39:07.570285 env[1160]: 2025-05-13 08:39:07.557 [INFO][4486] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:39:07.570285 env[1160]: 2025-05-13 08:39:07.564 [WARNING][4486] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" HandleID="k8s-pod-network.c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-eth0" May 13 08:39:07.570285 env[1160]: 2025-05-13 08:39:07.564 [INFO][4486] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" HandleID="k8s-pod-network.c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-eth0" May 13 08:39:07.570285 env[1160]: 2025-05-13 08:39:07.568 [INFO][4486] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:39:07.570285 env[1160]: 2025-05-13 08:39:07.569 [INFO][4479] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" May 13 08:39:07.570878 env[1160]: time="2025-05-13T08:39:07.570848708Z" level=info msg="TearDown network for sandbox \"c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae\" successfully" May 13 08:39:07.570946 env[1160]: time="2025-05-13T08:39:07.570928980Z" level=info msg="StopPodSandbox for \"c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae\" returns successfully" May 13 08:39:07.571603 env[1160]: time="2025-05-13T08:39:07.571562814Z" level=info msg="RemovePodSandbox for \"c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae\"" May 13 08:39:07.571659 env[1160]: time="2025-05-13T08:39:07.571603510Z" level=info msg="Forcibly stopping sandbox \"c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae\"" May 13 08:39:07.631894 kubelet[1940]: I0513 08:39:07.631510 1940 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-wnsw4" podStartSLOduration=33.828643105 podStartE2EDuration="49.631474632s" podCreationTimestamp="2025-05-13 08:38:18 +0000 UTC" firstStartedPulling="2025-05-13 08:38:50.999192038 +0000 UTC m=+44.952311720" lastFinishedPulling="2025-05-13 08:39:06.802023566 +0000 UTC m=+60.755143247" observedRunningTime="2025-05-13 08:39:07.63020971 +0000 UTC m=+61.583329391" watchObservedRunningTime="2025-05-13 08:39:07.631474632 +0000 UTC m=+61.584594323" May 13 08:39:07.674400 env[1160]: 2025-05-13 08:39:07.621 [WARNING][4504] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-eth0", GenerateName:"calico-kube-controllers-7685b4f9bb-", Namespace:"calico-system", SelfLink:"", UID:"ee88de73-bb38-4d28-8c79-de16aa79a964", ResourceVersion:"822", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 38, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7685b4f9bb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-702ca96d1c.novalocal", ContainerID:"0f3060755b7b5850c5ed0ce96fa2045f4aad0c3e2f5d17b856b7c0c99af0f71a", Pod:"calico-kube-controllers-7685b4f9bb-gqlkt", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.120.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7b025663018", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:39:07.674400 env[1160]: 2025-05-13 08:39:07.622 [INFO][4504] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" May 13 08:39:07.674400 env[1160]: 2025-05-13 08:39:07.622 [INFO][4504] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" iface="eth0" netns="" May 13 08:39:07.674400 env[1160]: 2025-05-13 08:39:07.622 [INFO][4504] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" May 13 08:39:07.674400 env[1160]: 2025-05-13 08:39:07.622 [INFO][4504] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" May 13 08:39:07.674400 env[1160]: 2025-05-13 08:39:07.662 [INFO][4512] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" HandleID="k8s-pod-network.c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-eth0" May 13 08:39:07.674400 env[1160]: 2025-05-13 08:39:07.662 [INFO][4512] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:39:07.674400 env[1160]: 2025-05-13 08:39:07.662 [INFO][4512] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:39:07.674400 env[1160]: 2025-05-13 08:39:07.670 [WARNING][4512] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" HandleID="k8s-pod-network.c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-eth0" May 13 08:39:07.674400 env[1160]: 2025-05-13 08:39:07.670 [INFO][4512] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" HandleID="k8s-pod-network.c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--kube--controllers--7685b4f9bb--gqlkt-eth0" May 13 08:39:07.674400 env[1160]: 2025-05-13 08:39:07.672 [INFO][4512] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:39:07.674400 env[1160]: 2025-05-13 08:39:07.673 [INFO][4504] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae" May 13 08:39:07.675022 env[1160]: time="2025-05-13T08:39:07.674428080Z" level=info msg="TearDown network for sandbox \"c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae\" successfully" May 13 08:39:07.678815 env[1160]: time="2025-05-13T08:39:07.678786687Z" level=info msg="RemovePodSandbox \"c18f313e093ec5c9a0fa3a7e6b9aea95ea19534ef9da01539f4cfc8db2b31eae\" returns successfully" May 13 08:39:07.679312 env[1160]: time="2025-05-13T08:39:07.679282230Z" level=info msg="StopPodSandbox for \"49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821\"" May 13 08:39:07.768010 env[1160]: 2025-05-13 08:39:07.723 [WARNING][4530] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-eth0", GenerateName:"calico-apiserver-6dc689f579-", Namespace:"calico-apiserver", SelfLink:"", UID:"1d7a9809-d4eb-451a-ba79-1d943bd8bb27", ResourceVersion:"870", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 38, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6dc689f579", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-702ca96d1c.novalocal", ContainerID:"d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805", Pod:"calico-apiserver-6dc689f579-kgtzs", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.120.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3cfb0c4082d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:39:07.768010 env[1160]: 2025-05-13 08:39:07.723 [INFO][4530] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" May 13 08:39:07.768010 env[1160]: 2025-05-13 08:39:07.723 [INFO][4530] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" iface="eth0" netns="" May 13 08:39:07.768010 env[1160]: 2025-05-13 08:39:07.723 [INFO][4530] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" May 13 08:39:07.768010 env[1160]: 2025-05-13 08:39:07.723 [INFO][4530] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" May 13 08:39:07.768010 env[1160]: 2025-05-13 08:39:07.756 [INFO][4537] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" HandleID="k8s-pod-network.49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-eth0" May 13 08:39:07.768010 env[1160]: 2025-05-13 08:39:07.756 [INFO][4537] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:39:07.768010 env[1160]: 2025-05-13 08:39:07.756 [INFO][4537] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:39:07.768010 env[1160]: 2025-05-13 08:39:07.764 [WARNING][4537] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" HandleID="k8s-pod-network.49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-eth0" May 13 08:39:07.768010 env[1160]: 2025-05-13 08:39:07.764 [INFO][4537] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" HandleID="k8s-pod-network.49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-eth0" May 13 08:39:07.768010 env[1160]: 2025-05-13 08:39:07.765 [INFO][4537] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:39:07.768010 env[1160]: 2025-05-13 08:39:07.767 [INFO][4530] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" May 13 08:39:07.768663 env[1160]: time="2025-05-13T08:39:07.768621819Z" level=info msg="TearDown network for sandbox \"49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821\" successfully" May 13 08:39:07.768743 env[1160]: time="2025-05-13T08:39:07.768724553Z" level=info msg="StopPodSandbox for \"49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821\" returns successfully" May 13 08:39:07.769765 env[1160]: time="2025-05-13T08:39:07.769734405Z" level=info msg="RemovePodSandbox for \"49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821\"" May 13 08:39:07.769898 env[1160]: time="2025-05-13T08:39:07.769854380Z" level=info msg="Forcibly stopping sandbox \"49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821\"" May 13 08:39:07.823690 systemd[1]: run-containerd-runc-k8s.io-9e1e2d54b192d56b2aa799a07fd0612a0851f1e843949eadd85a1388f898d414-runc.9sPsy7.mount: Deactivated successfully. May 13 08:39:07.849567 env[1160]: 2025-05-13 08:39:07.810 [WARNING][4555] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-eth0", GenerateName:"calico-apiserver-6dc689f579-", Namespace:"calico-apiserver", SelfLink:"", UID:"1d7a9809-d4eb-451a-ba79-1d943bd8bb27", ResourceVersion:"870", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 38, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6dc689f579", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-702ca96d1c.novalocal", ContainerID:"d429133abd7f77c10f1b4a44d9777652b9d80604a96144000332159268c3d805", Pod:"calico-apiserver-6dc689f579-kgtzs", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.120.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3cfb0c4082d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:39:07.849567 env[1160]: 2025-05-13 08:39:07.810 [INFO][4555] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" May 13 08:39:07.849567 env[1160]: 2025-05-13 08:39:07.810 [INFO][4555] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" iface="eth0" netns="" May 13 08:39:07.849567 env[1160]: 2025-05-13 08:39:07.810 [INFO][4555] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" May 13 08:39:07.849567 env[1160]: 2025-05-13 08:39:07.810 [INFO][4555] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" May 13 08:39:07.849567 env[1160]: 2025-05-13 08:39:07.839 [INFO][4562] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" HandleID="k8s-pod-network.49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-eth0" May 13 08:39:07.849567 env[1160]: 2025-05-13 08:39:07.839 [INFO][4562] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:39:07.849567 env[1160]: 2025-05-13 08:39:07.839 [INFO][4562] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:39:07.849567 env[1160]: 2025-05-13 08:39:07.845 [WARNING][4562] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" HandleID="k8s-pod-network.49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-eth0" May 13 08:39:07.849567 env[1160]: 2025-05-13 08:39:07.845 [INFO][4562] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" HandleID="k8s-pod-network.49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" Workload="ci--3510--3--7--n--702ca96d1c.novalocal-k8s-calico--apiserver--6dc689f579--kgtzs-eth0" May 13 08:39:07.849567 env[1160]: 2025-05-13 08:39:07.847 [INFO][4562] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:39:07.849567 env[1160]: 2025-05-13 08:39:07.848 [INFO][4555] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821" May 13 08:39:07.850171 env[1160]: time="2025-05-13T08:39:07.850124873Z" level=info msg="TearDown network for sandbox \"49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821\" successfully" May 13 08:39:07.854651 env[1160]: time="2025-05-13T08:39:07.854616440Z" level=info msg="RemovePodSandbox \"49c52444fd5f34bc48cf7c88b2e309c8acb4d00ab01cde985dd40e3d14f10821\" returns successfully" May 13 08:39:08.536000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:39:08.536000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002a44cc0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:39:08.536000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:39:08.542000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:39:08.542000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002aa7d60 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:39:08.542000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:39:08.542000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:39:08.542000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002aa7d80 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:39:08.542000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:39:08.543000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:39:08.543000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a44ce0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:39:08.543000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:39:09.271187 systemd[1]: run-containerd-runc-k8s.io-644bb87984673b39373ec4ba8c44c09fca429c2849b5090bcdf2609d55c97858-runc.lRWnsG.mount: Deactivated successfully. May 13 08:39:13.139021 kubelet[1940]: I0513 08:39:13.138963 1940 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 08:39:13.226000 audit[4598]: NETFILTER_CFG table=filter:116 family=2 entries=8 op=nft_register_rule pid=4598 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:39:13.231997 kernel: kauditd_printk_skb: 45 callbacks suppressed May 13 08:39:13.232053 kernel: audit: type=1325 audit(1747125553.226:1289): table=filter:116 family=2 entries=8 op=nft_register_rule pid=4598 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:39:13.226000 audit[4598]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffd6f375a0 a2=0 a3=7fffd6f3758c items=0 ppid=2066 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:13.246102 kernel: audit: type=1300 audit(1747125553.226:1289): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffd6f375a0 a2=0 a3=7fffd6f3758c items=0 ppid=2066 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:13.246161 kernel: audit: type=1327 audit(1747125553.226:1289): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:39:13.226000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:39:13.245000 audit[4598]: NETFILTER_CFG table=nat:117 family=2 entries=34 op=nft_register_chain pid=4598 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:39:13.253233 kernel: audit: type=1325 audit(1747125553.245:1290): table=nat:117 family=2 entries=34 op=nft_register_chain pid=4598 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:39:13.253293 kernel: audit: type=1300 audit(1747125553.245:1290): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fffd6f375a0 a2=0 a3=7fffd6f3758c items=0 ppid=2066 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:13.245000 audit[4598]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fffd6f375a0 a2=0 a3=7fffd6f3758c items=0 ppid=2066 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:39:13.260509 kernel: audit: type=1327 audit(1747125553.245:1290): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:39:13.245000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:39:31.882641 systemd[1]: run-containerd-runc-k8s.io-330ff46edc8b367c3954a29016aa2b66a3bef771202384c5641f8b80ded0ecc1-runc.8OvfnM.mount: Deactivated successfully. May 13 08:39:39.291294 systemd[1]: run-containerd-runc-k8s.io-644bb87984673b39373ec4ba8c44c09fca429c2849b5090bcdf2609d55c97858-runc.ch0Sng.mount: Deactivated successfully. May 13 08:39:52.389386 systemd[1]: run-containerd-runc-k8s.io-644bb87984673b39373ec4ba8c44c09fca429c2849b5090bcdf2609d55c97858-runc.SdRS2n.mount: Deactivated successfully. May 13 08:40:01.900000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:40:01.900000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00042bf80 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:40:01.932520 kernel: audit: type=1400 audit(1747125601.900:1291): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:40:01.932658 kernel: audit: type=1300 audit(1747125601.900:1291): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00042bf80 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:40:01.900000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:40:01.945537 kernel: audit: type=1327 audit(1747125601.900:1291): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:40:01.945782 kernel: audit: type=1400 audit(1747125601.901:1292): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:40:01.901000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:40:01.901000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00102a150 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:40:01.960248 kernel: audit: type=1300 audit(1747125601.901:1292): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00102a150 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:40:01.960464 kernel: audit: type=1327 audit(1747125601.901:1292): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:40:01.901000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:40:02.386000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:40:02.386000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7295 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:40:02.415993 kernel: audit: type=1400 audit(1747125602.386:1293): avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:40:02.416147 kernel: audit: type=1400 audit(1747125602.386:1294): avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7295 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:40:02.386000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00a44af30 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:40:02.435024 kernel: audit: type=1300 audit(1747125602.386:1294): arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00a44af30 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:40:02.435216 kernel: audit: type=1327 audit(1747125602.386:1294): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:40:02.386000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:40:02.387000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:40:02.387000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00a44af60 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:40:02.387000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:40:02.386000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00411a920 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:40:02.386000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:40:02.397000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7301 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:40:02.397000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00ad753e0 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:40:02.397000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:40:02.473000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:40:02.473000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00ad75410 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:40:02.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:40:02.473000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:40:02.473000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00411ac80 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:40:02.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:40:02.724000 audit[4093]: AVC avc: denied { watch } for pid=4093 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_08_38_35.3782379492/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c400,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c400,c861 tclass=file permissive=0 May 13 08:40:02.724000 audit[4093]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000cc1080 a2=fc6 a3=0 items=0 ppid=3312 pid=4093 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c400,c861 key=(null) May 13 08:40:02.724000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 08:40:03.136000 audit[4131]: AVC avc: denied { watch } for pid=4131 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_08_38_35.775369572/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c241 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c43,c241 tclass=file permissive=0 May 13 08:40:03.136000 audit[4131]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00119aee0 a2=fc6 a3=0 items=0 ppid=3356 pid=4131 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c241 key=(null) May 13 08:40:03.136000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 08:40:08.539000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:40:08.543277 kernel: kauditd_printk_skb: 20 callbacks suppressed May 13 08:40:08.543409 kernel: audit: type=1400 audit(1747125608.539:1301): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:40:08.557616 kernel: audit: type=1300 audit(1747125608.539:1301): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0009d8f40 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:40:08.539000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0009d8f40 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:40:08.539000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:40:08.543000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:40:08.606932 kernel: audit: type=1327 audit(1747125608.539:1301): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:40:08.607055 kernel: audit: type=1400 audit(1747125608.543:1302): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:40:08.607127 kernel: audit: type=1300 audit(1747125608.543:1302): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001755240 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:40:08.543000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001755240 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:40:08.543000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:40:08.623008 kernel: audit: type=1327 audit(1747125608.543:1302): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:40:08.623122 kernel: audit: type=1400 audit(1747125608.543:1303): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:40:08.543000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:40:08.543000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001755280 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:40:08.636123 kernel: audit: type=1300 audit(1747125608.543:1303): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001755280 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:40:08.636240 kernel: audit: type=1327 audit(1747125608.543:1303): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:40:08.543000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:40:08.642436 kernel: audit: type=1400 audit(1747125608.543:1304): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:40:08.543000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:40:08.543000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0009d9280 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:40:08.543000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:40:09.288708 systemd[1]: run-containerd-runc-k8s.io-644bb87984673b39373ec4ba8c44c09fca429c2849b5090bcdf2609d55c97858-runc.rixjpd.mount: Deactivated successfully. May 13 08:40:57.371817 update_engine[1149]: I0513 08:40:57.371632 1149 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs May 13 08:40:57.371817 update_engine[1149]: I0513 08:40:57.371697 1149 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs May 13 08:40:57.375717 update_engine[1149]: I0513 08:40:57.375259 1149 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs May 13 08:40:57.377177 update_engine[1149]: I0513 08:40:57.377080 1149 omaha_request_params.cc:62] Current group set to lts May 13 08:40:57.378556 update_engine[1149]: I0513 08:40:57.378253 1149 update_attempter.cc:499] Already updated boot flags. Skipping. May 13 08:40:57.378556 update_engine[1149]: I0513 08:40:57.378279 1149 update_attempter.cc:643] Scheduling an action processor start. May 13 08:40:57.378556 update_engine[1149]: I0513 08:40:57.378317 1149 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction May 13 08:40:57.378556 update_engine[1149]: I0513 08:40:57.378378 1149 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs May 13 08:40:57.379078 update_engine[1149]: I0513 08:40:57.378929 1149 omaha_request_action.cc:270] Posting an Omaha request to disabled May 13 08:40:57.379078 update_engine[1149]: I0513 08:40:57.378954 1149 omaha_request_action.cc:271] Request: May 13 08:40:57.379078 update_engine[1149]: May 13 08:40:57.379078 update_engine[1149]: May 13 08:40:57.379078 update_engine[1149]: May 13 08:40:57.379078 update_engine[1149]: May 13 08:40:57.379078 update_engine[1149]: May 13 08:40:57.379078 update_engine[1149]: May 13 08:40:57.379078 update_engine[1149]: May 13 08:40:57.379078 update_engine[1149]: May 13 08:40:57.379078 update_engine[1149]: I0513 08:40:57.378964 1149 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 13 08:40:57.387100 locksmithd[1197]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 May 13 08:40:57.389054 update_engine[1149]: I0513 08:40:57.388556 1149 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 13 08:40:57.389998 update_engine[1149]: E0513 08:40:57.389802 1149 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 13 08:40:57.389998 update_engine[1149]: I0513 08:40:57.389945 1149 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 May 13 08:41:01.902000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:41:01.907438 kernel: kauditd_printk_skb: 2 callbacks suppressed May 13 08:41:01.907591 kernel: audit: type=1400 audit(1747125661.902:1305): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:41:01.902000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a30b20 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:41:01.934563 kernel: audit: type=1300 audit(1747125661.902:1305): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a30b20 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:41:01.902000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:41:01.941695 kernel: audit: type=1327 audit(1747125661.902:1305): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:41:01.904000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:41:01.947919 kernel: audit: type=1400 audit(1747125661.904:1306): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:41:01.904000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e87c80 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:41:01.959576 kernel: audit: type=1300 audit(1747125661.904:1306): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e87c80 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:41:01.959707 kernel: audit: type=1327 audit(1747125661.904:1306): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:41:01.904000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:41:02.387000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:41:02.388000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7295 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:41:02.419014 kernel: audit: type=1400 audit(1747125662.387:1307): avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:41:02.419200 kernel: audit: type=1400 audit(1747125662.388:1308): avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7295 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:41:02.419275 kernel: audit: type=1300 audit(1747125662.388:1308): arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00a672390 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:41:02.388000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00a672390 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:41:02.437968 kernel: audit: type=1327 audit(1747125662.388:1308): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:41:02.388000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:41:02.388000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:41:02.388000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00c4b4700 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:41:02.388000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:41:02.387000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00a452510 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:41:02.387000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:41:02.403000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7301 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:41:02.403000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00a672600 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:41:02.403000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:41:02.473000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:41:02.473000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00c2b38a0 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:41:02.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:41:02.473000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:41:02.473000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00a672720 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:41:02.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:41:02.723000 audit[4093]: AVC avc: denied { watch } for pid=4093 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_08_38_35.3782379492/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c400,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c400,c861 tclass=file permissive=0 May 13 08:41:02.723000 audit[4093]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000cc1560 a2=fc6 a3=0 items=0 ppid=3312 pid=4093 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c400,c861 key=(null) May 13 08:41:02.723000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 08:41:03.136000 audit[4131]: AVC avc: denied { watch } for pid=4131 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_08_38_35.775369572/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c241 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c43,c241 tclass=file permissive=0 May 13 08:41:03.136000 audit[4131]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00119b420 a2=fc6 a3=0 items=0 ppid=3356 pid=4131 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c241 key=(null) May 13 08:41:03.136000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 08:41:07.300063 update_engine[1149]: I0513 08:41:07.299964 1149 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 13 08:41:07.300720 update_engine[1149]: I0513 08:41:07.300329 1149 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 13 08:41:07.300720 update_engine[1149]: E0513 08:41:07.300542 1149 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 13 08:41:07.300720 update_engine[1149]: I0513 08:41:07.300671 1149 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 May 13 08:41:08.540000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:41:08.545472 kernel: kauditd_printk_skb: 20 callbacks suppressed May 13 08:41:08.545641 kernel: audit: type=1400 audit(1747125668.540:1315): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:41:08.540000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a31f00 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:41:08.582406 kernel: audit: type=1300 audit(1747125668.540:1315): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a31f00 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:41:08.582637 kernel: audit: type=1327 audit(1747125668.540:1315): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:41:08.540000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:41:08.599568 kernel: audit: type=1400 audit(1747125668.544:1316): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:41:08.544000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:41:08.544000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0015ee220 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:41:08.627839 kernel: audit: type=1300 audit(1747125668.544:1316): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0015ee220 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:41:08.627948 kernel: audit: type=1327 audit(1747125668.544:1316): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:41:08.544000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:41:08.634112 kernel: audit: type=1400 audit(1747125668.545:1317): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:41:08.545000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:41:08.639670 kernel: audit: type=1300 audit(1747125668.545:1317): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014cf520 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:41:08.545000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014cf520 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:41:08.545000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:41:08.653282 kernel: audit: type=1327 audit(1747125668.545:1317): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:41:08.653391 kernel: audit: type=1400 audit(1747125668.547:1318): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:41:08.547000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:41:08.547000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014cfcc0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:41:08.547000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:41:09.286459 systemd[1]: run-containerd-runc-k8s.io-644bb87984673b39373ec4ba8c44c09fca429c2849b5090bcdf2609d55c97858-runc.ke0x0J.mount: Deactivated successfully. May 13 08:41:17.294684 update_engine[1149]: I0513 08:41:17.294235 1149 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 13 08:41:17.295615 update_engine[1149]: I0513 08:41:17.294723 1149 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 13 08:41:17.295615 update_engine[1149]: E0513 08:41:17.294883 1149 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 13 08:41:17.295615 update_engine[1149]: I0513 08:41:17.295010 1149 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 May 13 08:41:27.299937 update_engine[1149]: I0513 08:41:27.299827 1149 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 13 08:41:27.300475 update_engine[1149]: I0513 08:41:27.300056 1149 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 13 08:41:27.300475 update_engine[1149]: E0513 08:41:27.300154 1149 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 13 08:41:27.300475 update_engine[1149]: I0513 08:41:27.300223 1149 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded May 13 08:41:27.300475 update_engine[1149]: I0513 08:41:27.300230 1149 omaha_request_action.cc:621] Omaha request response: May 13 08:41:27.300475 update_engine[1149]: E0513 08:41:27.300355 1149 omaha_request_action.cc:640] Omaha request network transfer failed. May 13 08:41:27.300475 update_engine[1149]: I0513 08:41:27.300372 1149 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. May 13 08:41:27.300475 update_engine[1149]: I0513 08:41:27.300377 1149 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 13 08:41:27.300475 update_engine[1149]: I0513 08:41:27.300381 1149 update_attempter.cc:306] Processing Done. May 13 08:41:27.300475 update_engine[1149]: E0513 08:41:27.300392 1149 update_attempter.cc:619] Update failed. May 13 08:41:27.300475 update_engine[1149]: I0513 08:41:27.300397 1149 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse May 13 08:41:27.300475 update_engine[1149]: I0513 08:41:27.300401 1149 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) May 13 08:41:27.300475 update_engine[1149]: I0513 08:41:27.300406 1149 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. May 13 08:41:27.300475 update_engine[1149]: I0513 08:41:27.300508 1149 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction May 13 08:41:27.301270 update_engine[1149]: I0513 08:41:27.300527 1149 omaha_request_action.cc:270] Posting an Omaha request to disabled May 13 08:41:27.301270 update_engine[1149]: I0513 08:41:27.300530 1149 omaha_request_action.cc:271] Request: May 13 08:41:27.301270 update_engine[1149]: May 13 08:41:27.301270 update_engine[1149]: May 13 08:41:27.301270 update_engine[1149]: May 13 08:41:27.301270 update_engine[1149]: May 13 08:41:27.301270 update_engine[1149]: May 13 08:41:27.301270 update_engine[1149]: May 13 08:41:27.301270 update_engine[1149]: I0513 08:41:27.300535 1149 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 13 08:41:27.301270 update_engine[1149]: I0513 08:41:27.300640 1149 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 13 08:41:27.301270 update_engine[1149]: E0513 08:41:27.300707 1149 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 13 08:41:27.301270 update_engine[1149]: I0513 08:41:27.300771 1149 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded May 13 08:41:27.301270 update_engine[1149]: I0513 08:41:27.300779 1149 omaha_request_action.cc:621] Omaha request response: May 13 08:41:27.301270 update_engine[1149]: I0513 08:41:27.300786 1149 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 13 08:41:27.301270 update_engine[1149]: I0513 08:41:27.300791 1149 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 13 08:41:27.301270 update_engine[1149]: I0513 08:41:27.300793 1149 update_attempter.cc:306] Processing Done. May 13 08:41:27.301270 update_engine[1149]: I0513 08:41:27.300797 1149 update_attempter.cc:310] Error event sent. May 13 08:41:27.301270 update_engine[1149]: I0513 08:41:27.300808 1149 update_check_scheduler.cc:74] Next update check in 41m27s May 13 08:41:27.302224 locksmithd[1197]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 May 13 08:41:27.302224 locksmithd[1197]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 May 13 08:41:31.881156 systemd[1]: run-containerd-runc-k8s.io-330ff46edc8b367c3954a29016aa2b66a3bef771202384c5641f8b80ded0ecc1-runc.TGc7FA.mount: Deactivated successfully. May 13 08:41:39.287088 systemd[1]: run-containerd-runc-k8s.io-644bb87984673b39373ec4ba8c44c09fca429c2849b5090bcdf2609d55c97858-runc.LM0O5F.mount: Deactivated successfully. May 13 08:41:52.360282 systemd[1]: run-containerd-runc-k8s.io-644bb87984673b39373ec4ba8c44c09fca429c2849b5090bcdf2609d55c97858-runc.fC6eat.mount: Deactivated successfully. May 13 08:42:01.879315 systemd[1]: run-containerd-runc-k8s.io-330ff46edc8b367c3954a29016aa2b66a3bef771202384c5641f8b80ded0ecc1-runc.L7Ej8I.mount: Deactivated successfully. May 13 08:42:01.906000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:42:01.911523 kernel: kauditd_printk_skb: 2 callbacks suppressed May 13 08:42:01.911683 kernel: audit: type=1400 audit(1747125721.906:1319): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:42:01.906000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001efc700 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:42:01.932257 kernel: audit: type=1300 audit(1747125721.906:1319): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001efc700 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:42:01.932435 kernel: audit: type=1327 audit(1747125721.906:1319): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:42:01.906000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:42:01.906000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:42:01.944797 kernel: audit: type=1400 audit(1747125721.906:1320): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:42:01.944985 kernel: audit: type=1300 audit(1747125721.906:1320): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002c4eb10 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:42:01.906000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002c4eb10 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:42:01.906000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:42:01.958565 kernel: audit: type=1327 audit(1747125721.906:1320): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:42:02.389000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7295 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:42:02.405614 kernel: audit: type=1400 audit(1747125722.389:1321): avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7295 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:42:02.405757 kernel: audit: type=1300 audit(1747125722.389:1321): arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00f519fb0 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:42:02.389000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00f519fb0 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:42:02.389000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:42:02.440516 kernel: audit: type=1327 audit(1747125722.389:1321): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:42:02.390000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:42:02.390000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00b691480 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:42:02.390000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:42:02.455621 kernel: audit: type=1400 audit(1747125722.390:1322): avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:42:02.390000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:42:02.390000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00fb02030 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:42:02.390000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:42:02.405000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7301 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:42:02.405000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00fb020c0 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:42:02.405000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:42:02.475000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:42:02.475000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00b691600 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:42:02.475000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:42:02.476000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:42:02.476000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0106b43c0 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:42:02.476000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:42:02.725000 audit[4093]: AVC avc: denied { watch } for pid=4093 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_08_38_35.3782379492/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c400,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c400,c861 tclass=file permissive=0 May 13 08:42:02.725000 audit[4093]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c82b60 a2=fc6 a3=0 items=0 ppid=3312 pid=4093 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c400,c861 key=(null) May 13 08:42:02.725000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 08:42:03.138000 audit[4131]: AVC avc: denied { watch } for pid=4131 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_08_38_35.775369572/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c241 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c43,c241 tclass=file permissive=0 May 13 08:42:03.138000 audit[4131]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00119a1c0 a2=fc6 a3=0 items=0 ppid=3356 pid=4131 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c241 key=(null) May 13 08:42:03.138000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 08:42:08.547312 kernel: kauditd_printk_skb: 20 callbacks suppressed May 13 08:42:08.571040 kernel: audit: type=1400 audit(1747125728.542:1329): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:42:08.571129 kernel: audit: type=1300 audit(1747125728.542:1329): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001efd920 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:42:08.542000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:42:08.542000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001efd920 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:42:08.542000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:42:08.548000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:42:08.606603 kernel: audit: type=1327 audit(1747125728.542:1329): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:42:08.606714 kernel: audit: type=1400 audit(1747125728.548:1330): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:42:08.606746 kernel: audit: type=1300 audit(1747125728.548:1330): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002276140 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:42:08.548000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002276140 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:42:08.548000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:42:08.625357 kernel: audit: type=1327 audit(1747125728.548:1330): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:42:08.625524 kernel: audit: type=1400 audit(1747125728.548:1331): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:42:08.548000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:42:08.631233 kernel: audit: type=1300 audit(1747125728.548:1331): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002276160 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:42:08.548000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002276160 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:42:08.548000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:42:08.645703 kernel: audit: type=1327 audit(1747125728.548:1331): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:42:08.645873 kernel: audit: type=1400 audit(1747125728.549:1332): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:42:08.549000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:42:08.549000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002276180 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:42:08.549000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:42:09.304706 systemd[1]: run-containerd-runc-k8s.io-644bb87984673b39373ec4ba8c44c09fca429c2849b5090bcdf2609d55c97858-runc.8FsHhT.mount: Deactivated successfully. May 13 08:42:10.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.14:22-172.24.4.1:59594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:10.366271 systemd[1]: Started sshd@9-172.24.4.14:22-172.24.4.1:59594.service. May 13 08:42:11.774000 audit[4989]: USER_ACCT pid=4989 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:11.775699 sshd[4989]: Accepted publickey for core from 172.24.4.1 port 59594 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:42:11.776000 audit[4989]: CRED_ACQ pid=4989 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:11.776000 audit[4989]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed509af10 a2=3 a3=0 items=0 ppid=1 pid=4989 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:11.776000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 08:42:11.778702 sshd[4989]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:42:11.790991 systemd[1]: Started session-10.scope. May 13 08:42:11.791475 systemd-logind[1147]: New session 10 of user core. May 13 08:42:11.806000 audit[4989]: USER_START pid=4989 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:11.809000 audit[4991]: CRED_ACQ pid=4991 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:12.558045 sshd[4989]: pam_unix(sshd:session): session closed for user core May 13 08:42:12.559000 audit[4989]: USER_END pid=4989 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:12.559000 audit[4989]: CRED_DISP pid=4989 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:12.561467 systemd[1]: sshd@9-172.24.4.14:22-172.24.4.1:59594.service: Deactivated successfully. May 13 08:42:12.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.14:22-172.24.4.1:59594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:12.562737 systemd-logind[1147]: Session 10 logged out. Waiting for processes to exit. May 13 08:42:12.562768 systemd[1]: session-10.scope: Deactivated successfully. May 13 08:42:12.563947 systemd-logind[1147]: Removed session 10. May 13 08:42:17.589110 kernel: kauditd_printk_skb: 13 callbacks suppressed May 13 08:42:17.589304 kernel: audit: type=1130 audit(1747125737.568:1342): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.14:22-172.24.4.1:45512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:17.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.14:22-172.24.4.1:45512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:17.568174 systemd[1]: Started sshd@10-172.24.4.14:22-172.24.4.1:45512.service. May 13 08:42:18.980000 audit[5003]: USER_ACCT pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:18.981461 sshd[5003]: Accepted publickey for core from 172.24.4.1 port 45512 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:42:18.996606 kernel: audit: type=1101 audit(1747125738.980:1343): pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:18.996000 audit[5003]: CRED_ACQ pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:18.998082 sshd[5003]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:42:19.022019 kernel: audit: type=1103 audit(1747125738.996:1344): pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:19.022163 kernel: audit: type=1006 audit(1747125738.996:1345): pid=5003 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 13 08:42:18.996000 audit[5003]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff98ff3080 a2=3 a3=0 items=0 ppid=1 pid=5003 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:19.048567 kernel: audit: type=1300 audit(1747125738.996:1345): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff98ff3080 a2=3 a3=0 items=0 ppid=1 pid=5003 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:18.996000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 08:42:19.055638 kernel: audit: type=1327 audit(1747125738.996:1345): proctitle=737368643A20636F7265205B707269765D May 13 08:42:19.059585 systemd-logind[1147]: New session 11 of user core. May 13 08:42:19.060245 systemd[1]: Started session-11.scope. May 13 08:42:19.069000 audit[5003]: USER_START pid=5003 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:19.071000 audit[5005]: CRED_ACQ pid=5005 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:19.090729 kernel: audit: type=1105 audit(1747125739.069:1346): pid=5003 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:19.090785 kernel: audit: type=1103 audit(1747125739.071:1347): pid=5005 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:19.722439 sshd[5003]: pam_unix(sshd:session): session closed for user core May 13 08:42:19.724000 audit[5003]: USER_END pid=5003 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:19.741545 kernel: audit: type=1106 audit(1747125739.724:1348): pid=5003 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:19.741705 systemd[1]: sshd@10-172.24.4.14:22-172.24.4.1:45512.service: Deactivated successfully. May 13 08:42:19.743227 systemd[1]: session-11.scope: Deactivated successfully. May 13 08:42:19.724000 audit[5003]: CRED_DISP pid=5003 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:19.757549 kernel: audit: type=1104 audit(1747125739.724:1349): pid=5003 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:19.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.14:22-172.24.4.1:45512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:19.758660 systemd-logind[1147]: Session 11 logged out. Waiting for processes to exit. May 13 08:42:19.760644 systemd-logind[1147]: Removed session 11. May 13 08:42:24.750759 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 08:42:24.750965 kernel: audit: type=1130 audit(1747125744.732:1351): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.14:22-172.24.4.1:39156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:24.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.14:22-172.24.4.1:39156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:24.733106 systemd[1]: Started sshd@11-172.24.4.14:22-172.24.4.1:39156.service. May 13 08:42:25.798000 audit[5015]: USER_ACCT pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:25.815072 sshd[5015]: Accepted publickey for core from 172.24.4.1 port 39156 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:42:25.815673 kernel: audit: type=1101 audit(1747125745.798:1352): pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:25.814000 audit[5015]: CRED_ACQ pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:25.816241 sshd[5015]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:42:25.830619 kernel: audit: type=1103 audit(1747125745.814:1353): pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:25.814000 audit[5015]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcca78b060 a2=3 a3=0 items=0 ppid=1 pid=5015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:25.855639 kernel: audit: type=1006 audit(1747125745.814:1354): pid=5015 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 May 13 08:42:25.855924 kernel: audit: type=1300 audit(1747125745.814:1354): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcca78b060 a2=3 a3=0 items=0 ppid=1 pid=5015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:25.814000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 08:42:25.861684 kernel: audit: type=1327 audit(1747125745.814:1354): proctitle=737368643A20636F7265205B707269765D May 13 08:42:25.870362 systemd-logind[1147]: New session 12 of user core. May 13 08:42:25.872416 systemd[1]: Started session-12.scope. May 13 08:42:25.888000 audit[5015]: USER_START pid=5015 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:25.902761 kernel: audit: type=1105 audit(1747125745.888:1355): pid=5015 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:25.903161 kernel: audit: type=1103 audit(1747125745.901:1356): pid=5017 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:25.901000 audit[5017]: CRED_ACQ pid=5017 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:26.681006 sshd[5015]: pam_unix(sshd:session): session closed for user core May 13 08:42:26.683000 audit[5015]: USER_END pid=5015 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:26.689052 systemd[1]: sshd@11-172.24.4.14:22-172.24.4.1:39156.service: Deactivated successfully. May 13 08:42:26.690666 systemd[1]: session-12.scope: Deactivated successfully. May 13 08:42:26.701545 kernel: audit: type=1106 audit(1747125746.683:1357): pid=5015 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:26.702446 systemd[1]: Started sshd@12-172.24.4.14:22-172.24.4.1:39166.service. May 13 08:42:26.705344 systemd-logind[1147]: Session 12 logged out. Waiting for processes to exit. May 13 08:42:26.683000 audit[5015]: CRED_DISP pid=5015 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:26.710439 systemd-logind[1147]: Removed session 12. May 13 08:42:26.722566 kernel: audit: type=1104 audit(1747125746.683:1358): pid=5015 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:26.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.14:22-172.24.4.1:39156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:26.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.14:22-172.24.4.1:39166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:27.899000 audit[5027]: USER_ACCT pid=5027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:27.900198 sshd[5027]: Accepted publickey for core from 172.24.4.1 port 39166 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:42:27.901000 audit[5027]: CRED_ACQ pid=5027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:27.901000 audit[5027]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff469e60e0 a2=3 a3=0 items=0 ppid=1 pid=5027 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:27.901000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 08:42:27.902538 sshd[5027]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:42:27.914608 systemd-logind[1147]: New session 13 of user core. May 13 08:42:27.915428 systemd[1]: Started session-13.scope. May 13 08:42:27.929000 audit[5027]: USER_START pid=5027 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:27.932000 audit[5030]: CRED_ACQ pid=5030 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:28.740598 sshd[5027]: pam_unix(sshd:session): session closed for user core May 13 08:42:28.743000 audit[5027]: USER_END pid=5027 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:28.743000 audit[5027]: CRED_DISP pid=5027 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:28.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.14:22-172.24.4.1:39182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:28.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.14:22-172.24.4.1:39166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:28.748801 systemd[1]: Started sshd@13-172.24.4.14:22-172.24.4.1:39182.service. May 13 08:42:28.751140 systemd[1]: sshd@12-172.24.4.14:22-172.24.4.1:39166.service: Deactivated successfully. May 13 08:42:28.752924 systemd[1]: session-13.scope: Deactivated successfully. May 13 08:42:28.757076 systemd-logind[1147]: Session 13 logged out. Waiting for processes to exit. May 13 08:42:28.759956 systemd-logind[1147]: Removed session 13. May 13 08:42:30.157462 sshd[5037]: Accepted publickey for core from 172.24.4.1 port 39182 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:42:30.156000 audit[5037]: USER_ACCT pid=5037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:30.161166 kernel: kauditd_printk_skb: 13 callbacks suppressed May 13 08:42:30.161289 kernel: audit: type=1101 audit(1747125750.156:1370): pid=5037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:30.176000 audit[5037]: CRED_ACQ pid=5037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:30.177952 sshd[5037]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:42:30.191563 kernel: audit: type=1103 audit(1747125750.176:1371): pid=5037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:30.201601 kernel: audit: type=1006 audit(1747125750.176:1372): pid=5037 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 13 08:42:30.176000 audit[5037]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcaab9730 a2=3 a3=0 items=0 ppid=1 pid=5037 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:30.217685 kernel: audit: type=1300 audit(1747125750.176:1372): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcaab9730 a2=3 a3=0 items=0 ppid=1 pid=5037 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:30.217806 kernel: audit: type=1327 audit(1747125750.176:1372): proctitle=737368643A20636F7265205B707269765D May 13 08:42:30.176000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 08:42:30.229635 systemd-logind[1147]: New session 14 of user core. May 13 08:42:30.231170 systemd[1]: Started session-14.scope. May 13 08:42:30.244000 audit[5037]: USER_START pid=5037 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:30.263306 kernel: audit: type=1105 audit(1747125750.244:1373): pid=5037 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:30.263434 kernel: audit: type=1103 audit(1747125750.262:1374): pid=5040 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:30.262000 audit[5040]: CRED_ACQ pid=5040 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:30.898129 sshd[5037]: pam_unix(sshd:session): session closed for user core May 13 08:42:30.897000 audit[5037]: USER_END pid=5037 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:30.898000 audit[5037]: CRED_DISP pid=5037 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:30.907789 systemd[1]: sshd@13-172.24.4.14:22-172.24.4.1:39182.service: Deactivated successfully. May 13 08:42:30.909264 systemd[1]: session-14.scope: Deactivated successfully. May 13 08:42:30.912526 kernel: audit: type=1106 audit(1747125750.897:1375): pid=5037 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:30.912642 kernel: audit: type=1104 audit(1747125750.898:1376): pid=5037 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:30.913637 systemd-logind[1147]: Session 14 logged out. Waiting for processes to exit. May 13 08:42:30.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.14:22-172.24.4.1:39182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:30.920353 systemd-logind[1147]: Removed session 14. May 13 08:42:30.920614 kernel: audit: type=1131 audit(1747125750.906:1377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.14:22-172.24.4.1:39182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:31.873060 systemd[1]: run-containerd-runc-k8s.io-330ff46edc8b367c3954a29016aa2b66a3bef771202384c5641f8b80ded0ecc1-runc.GDwD45.mount: Deactivated successfully. May 13 08:42:35.908958 systemd[1]: Started sshd@14-172.24.4.14:22-172.24.4.1:39248.service. May 13 08:42:35.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.14:22-172.24.4.1:39248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:35.924699 kernel: audit: type=1130 audit(1747125755.908:1378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.14:22-172.24.4.1:39248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:37.040273 sshd[5073]: Accepted publickey for core from 172.24.4.1 port 39248 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:42:37.038000 audit[5073]: USER_ACCT pid=5073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:37.054000 audit[5073]: CRED_ACQ pid=5073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:37.070441 kernel: audit: type=1101 audit(1747125757.038:1379): pid=5073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:37.070633 kernel: audit: type=1103 audit(1747125757.054:1380): pid=5073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:37.057123 sshd[5073]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:42:37.071831 kernel: audit: type=1006 audit(1747125757.054:1381): pid=5073 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 13 08:42:37.054000 audit[5073]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcacf93cf0 a2=3 a3=0 items=0 ppid=1 pid=5073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:37.095249 kernel: audit: type=1300 audit(1747125757.054:1381): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcacf93cf0 a2=3 a3=0 items=0 ppid=1 pid=5073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:37.095370 kernel: audit: type=1327 audit(1747125757.054:1381): proctitle=737368643A20636F7265205B707269765D May 13 08:42:37.054000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 08:42:37.105378 systemd-logind[1147]: New session 15 of user core. May 13 08:42:37.107095 systemd[1]: Started session-15.scope. May 13 08:42:37.122000 audit[5073]: USER_START pid=5073 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:37.128000 audit[5075]: CRED_ACQ pid=5075 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:37.150010 kernel: audit: type=1105 audit(1747125757.122:1382): pid=5073 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:37.150165 kernel: audit: type=1103 audit(1747125757.128:1383): pid=5075 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:37.743438 sshd[5073]: pam_unix(sshd:session): session closed for user core May 13 08:42:37.744000 audit[5073]: USER_END pid=5073 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:37.749066 systemd[1]: sshd@14-172.24.4.14:22-172.24.4.1:39248.service: Deactivated successfully. May 13 08:42:37.750816 systemd[1]: session-15.scope: Deactivated successfully. May 13 08:42:37.762544 kernel: audit: type=1106 audit(1747125757.744:1384): pid=5073 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:37.744000 audit[5073]: CRED_DISP pid=5073 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:37.777572 kernel: audit: type=1104 audit(1747125757.744:1385): pid=5073 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:37.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.14:22-172.24.4.1:39248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:37.778182 systemd-logind[1147]: Session 15 logged out. Waiting for processes to exit. May 13 08:42:37.780283 systemd-logind[1147]: Removed session 15. May 13 08:42:39.301714 systemd[1]: run-containerd-runc-k8s.io-644bb87984673b39373ec4ba8c44c09fca429c2849b5090bcdf2609d55c97858-runc.1vK5bw.mount: Deactivated successfully. May 13 08:42:42.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.14:22-172.24.4.1:39262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:42.750257 systemd[1]: Started sshd@15-172.24.4.14:22-172.24.4.1:39262.service. May 13 08:42:42.753110 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 08:42:42.753187 kernel: audit: type=1130 audit(1747125762.749:1387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.14:22-172.24.4.1:39262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:43.955008 sshd[5110]: Accepted publickey for core from 172.24.4.1 port 39262 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:42:43.953000 audit[5110]: USER_ACCT pid=5110 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:43.970595 kernel: audit: type=1101 audit(1747125763.953:1388): pid=5110 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:43.969000 audit[5110]: CRED_ACQ pid=5110 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:43.987098 kernel: audit: type=1103 audit(1747125763.969:1389): pid=5110 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:43.972006 sshd[5110]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:42:43.997639 kernel: audit: type=1006 audit(1747125763.969:1390): pid=5110 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 13 08:42:43.969000 audit[5110]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd06319b40 a2=3 a3=0 items=0 ppid=1 pid=5110 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:44.013684 kernel: audit: type=1300 audit(1747125763.969:1390): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd06319b40 a2=3 a3=0 items=0 ppid=1 pid=5110 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:43.969000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 08:42:44.020685 kernel: audit: type=1327 audit(1747125763.969:1390): proctitle=737368643A20636F7265205B707269765D May 13 08:42:44.027816 systemd-logind[1147]: New session 16 of user core. May 13 08:42:44.028342 systemd[1]: Started session-16.scope. May 13 08:42:44.040000 audit[5110]: USER_START pid=5110 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:44.061543 kernel: audit: type=1105 audit(1747125764.040:1391): pid=5110 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:44.042000 audit[5112]: CRED_ACQ pid=5112 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:44.086863 kernel: audit: type=1103 audit(1747125764.042:1392): pid=5112 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:44.737119 sshd[5110]: pam_unix(sshd:session): session closed for user core May 13 08:42:44.741000 audit[5110]: USER_END pid=5110 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:44.770612 kernel: audit: type=1106 audit(1747125764.741:1393): pid=5110 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:44.741000 audit[5110]: CRED_DISP pid=5110 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:44.771880 systemd[1]: sshd@15-172.24.4.14:22-172.24.4.1:39262.service: Deactivated successfully. May 13 08:42:44.775568 systemd[1]: session-16.scope: Deactivated successfully. May 13 08:42:44.785552 kernel: audit: type=1104 audit(1747125764.741:1394): pid=5110 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:44.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.14:22-172.24.4.1:39262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:44.787625 systemd-logind[1147]: Session 16 logged out. Waiting for processes to exit. May 13 08:42:44.790301 systemd-logind[1147]: Removed session 16. May 13 08:42:49.754168 systemd[1]: Started sshd@16-172.24.4.14:22-172.24.4.1:59842.service. May 13 08:42:49.761318 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 08:42:49.761757 kernel: audit: type=1130 audit(1747125769.755:1396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.14:22-172.24.4.1:59842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:49.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.14:22-172.24.4.1:59842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:51.115000 audit[5122]: USER_ACCT pid=5122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:51.117695 sshd[5122]: Accepted publickey for core from 172.24.4.1 port 59842 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:42:51.132565 kernel: audit: type=1101 audit(1747125771.115:1397): pid=5122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:51.135006 sshd[5122]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:42:51.132000 audit[5122]: CRED_ACQ pid=5122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:51.151557 kernel: audit: type=1103 audit(1747125771.132:1398): pid=5122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:51.161607 kernel: audit: type=1006 audit(1747125771.132:1399): pid=5122 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 13 08:42:51.132000 audit[5122]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc76da2f0 a2=3 a3=0 items=0 ppid=1 pid=5122 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:51.132000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 08:42:51.184581 kernel: audit: type=1300 audit(1747125771.132:1399): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc76da2f0 a2=3 a3=0 items=0 ppid=1 pid=5122 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:51.184742 kernel: audit: type=1327 audit(1747125771.132:1399): proctitle=737368643A20636F7265205B707269765D May 13 08:42:51.188018 systemd-logind[1147]: New session 17 of user core. May 13 08:42:51.188282 systemd[1]: Started session-17.scope. May 13 08:42:51.201000 audit[5122]: USER_START pid=5122 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:51.221540 kernel: audit: type=1105 audit(1747125771.201:1400): pid=5122 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:51.221834 kernel: audit: type=1103 audit(1747125771.219:1401): pid=5125 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:51.219000 audit[5125]: CRED_ACQ pid=5125 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:52.053976 sshd[5122]: pam_unix(sshd:session): session closed for user core May 13 08:42:52.055000 audit[5122]: USER_END pid=5122 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:52.061995 systemd[1]: sshd@16-172.24.4.14:22-172.24.4.1:59842.service: Deactivated successfully. May 13 08:42:52.063585 systemd[1]: session-17.scope: Deactivated successfully. May 13 08:42:52.074658 kernel: audit: type=1106 audit(1747125772.055:1402): pid=5122 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:52.077762 systemd[1]: Started sshd@17-172.24.4.14:22-172.24.4.1:59850.service. May 13 08:42:52.055000 audit[5122]: CRED_DISP pid=5122 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:52.080237 systemd-logind[1147]: Session 17 logged out. Waiting for processes to exit. May 13 08:42:52.085884 systemd-logind[1147]: Removed session 17. May 13 08:42:52.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.14:22-172.24.4.1:59842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:52.093741 kernel: audit: type=1104 audit(1747125772.055:1403): pid=5122 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:52.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.14:22-172.24.4.1:59850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:53.312696 sshd[5135]: Accepted publickey for core from 172.24.4.1 port 59850 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:42:53.311000 audit[5135]: USER_ACCT pid=5135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:53.312000 audit[5135]: CRED_ACQ pid=5135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:53.312000 audit[5135]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeceae5e30 a2=3 a3=0 items=0 ppid=1 pid=5135 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:53.312000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 08:42:53.314975 sshd[5135]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:42:53.321445 systemd-logind[1147]: New session 18 of user core. May 13 08:42:53.323982 systemd[1]: Started session-18.scope. May 13 08:42:53.329000 audit[5135]: USER_START pid=5135 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:53.332000 audit[5156]: CRED_ACQ pid=5156 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:54.331209 sshd[5135]: pam_unix(sshd:session): session closed for user core May 13 08:42:54.332000 audit[5135]: USER_END pid=5135 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:54.332000 audit[5135]: CRED_DISP pid=5135 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:54.340939 systemd[1]: sshd@17-172.24.4.14:22-172.24.4.1:59850.service: Deactivated successfully. May 13 08:42:54.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.14:22-172.24.4.1:59850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:54.343149 systemd[1]: session-18.scope: Deactivated successfully. May 13 08:42:54.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.14:22-172.24.4.1:34932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:54.350666 systemd-logind[1147]: Session 18 logged out. Waiting for processes to exit. May 13 08:42:54.351170 systemd[1]: Started sshd@18-172.24.4.14:22-172.24.4.1:34932.service. May 13 08:42:54.358738 systemd-logind[1147]: Removed session 18. May 13 08:42:55.609000 audit[5163]: USER_ACCT pid=5163 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:55.611300 sshd[5163]: Accepted publickey for core from 172.24.4.1 port 34932 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:42:55.614249 kernel: kauditd_printk_skb: 13 callbacks suppressed May 13 08:42:55.614427 kernel: audit: type=1101 audit(1747125775.609:1415): pid=5163 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:55.628000 audit[5163]: CRED_ACQ pid=5163 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:55.631282 sshd[5163]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:42:55.645557 kernel: audit: type=1103 audit(1747125775.628:1416): pid=5163 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:55.658556 kernel: audit: type=1006 audit(1747125775.629:1417): pid=5163 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 May 13 08:42:55.658771 kernel: audit: type=1300 audit(1747125775.629:1417): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd995d7910 a2=3 a3=0 items=0 ppid=1 pid=5163 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:55.629000 audit[5163]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd995d7910 a2=3 a3=0 items=0 ppid=1 pid=5163 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:55.672822 kernel: audit: type=1327 audit(1747125775.629:1417): proctitle=737368643A20636F7265205B707269765D May 13 08:42:55.629000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 08:42:55.683668 systemd-logind[1147]: New session 19 of user core. May 13 08:42:55.686138 systemd[1]: Started session-19.scope. May 13 08:42:55.700000 audit[5163]: USER_START pid=5163 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:55.701000 audit[5165]: CRED_ACQ pid=5165 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:55.727385 kernel: audit: type=1105 audit(1747125775.700:1418): pid=5163 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:55.727547 kernel: audit: type=1103 audit(1747125775.701:1419): pid=5165 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:58.911000 audit[5175]: NETFILTER_CFG table=filter:118 family=2 entries=20 op=nft_register_rule pid=5175 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:42:58.911000 audit[5175]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffdadbd88b0 a2=0 a3=7ffdadbd889c items=0 ppid=2066 pid=5175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:58.930824 kernel: audit: type=1325 audit(1747125778.911:1420): table=filter:118 family=2 entries=20 op=nft_register_rule pid=5175 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:42:58.930918 kernel: audit: type=1300 audit(1747125778.911:1420): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffdadbd88b0 a2=0 a3=7ffdadbd889c items=0 ppid=2066 pid=5175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:58.911000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:42:58.935118 kernel: audit: type=1327 audit(1747125778.911:1420): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:42:58.934000 audit[5175]: NETFILTER_CFG table=nat:119 family=2 entries=22 op=nft_register_rule pid=5175 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:42:58.934000 audit[5175]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdadbd88b0 a2=0 a3=0 items=0 ppid=2066 pid=5175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:58.934000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:42:58.962000 audit[5177]: NETFILTER_CFG table=filter:120 family=2 entries=32 op=nft_register_rule pid=5177 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:42:58.962000 audit[5177]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe7edced90 a2=0 a3=7ffe7edced7c items=0 ppid=2066 pid=5177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:58.962000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:42:58.967000 audit[5177]: NETFILTER_CFG table=nat:121 family=2 entries=22 op=nft_register_rule pid=5177 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:42:58.967000 audit[5177]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe7edced90 a2=0 a3=0 items=0 ppid=2066 pid=5177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:58.967000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:42:59.176942 sshd[5163]: pam_unix(sshd:session): session closed for user core May 13 08:42:59.181000 audit[5163]: USER_END pid=5163 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:59.181000 audit[5163]: CRED_DISP pid=5163 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:59.188225 systemd[1]: Started sshd@19-172.24.4.14:22-172.24.4.1:34940.service. May 13 08:42:59.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.14:22-172.24.4.1:34940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:59.192936 systemd[1]: sshd@18-172.24.4.14:22-172.24.4.1:34932.service: Deactivated successfully. May 13 08:42:59.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.14:22-172.24.4.1:34932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:59.198184 systemd[1]: session-19.scope: Deactivated successfully. May 13 08:42:59.198478 systemd[1]: session-19.scope: Consumed 1.024s CPU time. May 13 08:42:59.200424 systemd-logind[1147]: Session 19 logged out. Waiting for processes to exit. May 13 08:42:59.211810 systemd-logind[1147]: Removed session 19. May 13 08:43:00.210000 audit[5179]: USER_ACCT pid=5179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:00.212586 sshd[5179]: Accepted publickey for core from 172.24.4.1 port 34940 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:43:00.213000 audit[5179]: CRED_ACQ pid=5179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:00.213000 audit[5179]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe09f97600 a2=3 a3=0 items=0 ppid=1 pid=5179 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:00.213000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 08:43:00.216046 sshd[5179]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:43:00.228821 systemd-logind[1147]: New session 20 of user core. May 13 08:43:00.230879 systemd[1]: Started session-20.scope. May 13 08:43:00.243000 audit[5179]: USER_START pid=5179 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:00.247000 audit[5182]: CRED_ACQ pid=5182 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:01.280459 sshd[5179]: pam_unix(sshd:session): session closed for user core May 13 08:43:01.296865 kernel: kauditd_printk_skb: 20 callbacks suppressed May 13 08:43:01.297045 kernel: audit: type=1106 audit(1747125781.282:1433): pid=5179 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:01.282000 audit[5179]: USER_END pid=5179 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:01.286332 systemd[1]: sshd@19-172.24.4.14:22-172.24.4.1:34940.service: Deactivated successfully. May 13 08:43:01.289767 systemd[1]: session-20.scope: Deactivated successfully. May 13 08:43:01.293749 systemd-logind[1147]: Session 20 logged out. Waiting for processes to exit. May 13 08:43:01.282000 audit[5179]: CRED_DISP pid=5179 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:01.305545 kernel: audit: type=1104 audit(1747125781.282:1434): pid=5179 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:01.303505 systemd[1]: Started sshd@20-172.24.4.14:22-172.24.4.1:34952.service. May 13 08:43:01.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.14:22-172.24.4.1:34940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:43:01.310936 systemd-logind[1147]: Removed session 20. May 13 08:43:01.316555 kernel: audit: type=1131 audit(1747125781.287:1435): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.14:22-172.24.4.1:34940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:43:01.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.14:22-172.24.4.1:34952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:43:01.330635 kernel: audit: type=1130 audit(1747125781.304:1436): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.14:22-172.24.4.1:34952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:43:01.889240 systemd[1]: run-containerd-runc-k8s.io-330ff46edc8b367c3954a29016aa2b66a3bef771202384c5641f8b80ded0ecc1-runc.Ow72PV.mount: Deactivated successfully. May 13 08:43:01.906000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:43:01.923545 kernel: audit: type=1400 audit(1747125781.906:1437): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:43:01.923719 kernel: audit: type=1300 audit(1747125781.906:1437): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c003096380 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:43:01.906000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c003096380 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:43:01.906000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:43:01.948193 kernel: audit: type=1327 audit(1747125781.906:1437): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:43:01.906000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:43:01.906000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0023e22d0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:43:01.977860 kernel: audit: type=1400 audit(1747125781.906:1438): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:43:01.978020 kernel: audit: type=1300 audit(1747125781.906:1438): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0023e22d0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:43:01.906000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:43:01.984839 kernel: audit: type=1327 audit(1747125781.906:1438): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:43:02.390000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7295 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:43:02.390000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00b394330 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:43:02.390000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:43:02.390000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:43:02.390000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00a1637a0 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:43:02.390000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:43:02.391000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:43:02.391000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00ae65fb0 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:43:02.391000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:43:02.407000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7301 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:43:02.407000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00a75c150 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:43:02.407000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:43:02.476000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:43:02.476000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00a75c630 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:43:02.476000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:43:02.476000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:43:02.476000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00a4c0840 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:43:02.476000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:43:02.642000 audit[5189]: USER_ACCT pid=5189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:02.644013 sshd[5189]: Accepted publickey for core from 172.24.4.1 port 34952 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:43:02.645628 sshd[5189]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:43:02.643000 audit[5189]: CRED_ACQ pid=5189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:02.643000 audit[5189]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb5708930 a2=3 a3=0 items=0 ppid=1 pid=5189 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:02.643000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 08:43:02.654035 systemd[1]: Started session-21.scope. May 13 08:43:02.655589 systemd-logind[1147]: New session 21 of user core. May 13 08:43:02.664000 audit[5189]: USER_START pid=5189 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:02.666000 audit[5211]: CRED_ACQ pid=5211 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:02.726000 audit[4093]: AVC avc: denied { watch } for pid=4093 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_08_38_35.3782379492/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c400,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c400,c861 tclass=file permissive=0 May 13 08:43:02.726000 audit[4093]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c82da0 a2=fc6 a3=0 items=0 ppid=3312 pid=4093 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c400,c861 key=(null) May 13 08:43:02.726000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 08:43:03.139000 audit[4131]: AVC avc: denied { watch } for pid=4131 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_08_38_35.775369572/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c241 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c43,c241 tclass=file permissive=0 May 13 08:43:03.139000 audit[4131]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00119b0e0 a2=fc6 a3=0 items=0 ppid=3356 pid=4131 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c241 key=(null) May 13 08:43:03.139000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 08:43:03.564089 sshd[5189]: pam_unix(sshd:session): session closed for user core May 13 08:43:03.564000 audit[5189]: USER_END pid=5189 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:03.564000 audit[5189]: CRED_DISP pid=5189 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:03.569150 systemd[1]: sshd@20-172.24.4.14:22-172.24.4.1:34952.service: Deactivated successfully. May 13 08:43:03.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.14:22-172.24.4.1:34952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:43:03.571039 systemd[1]: session-21.scope: Deactivated successfully. May 13 08:43:03.572440 systemd-logind[1147]: Session 21 logged out. Waiting for processes to exit. May 13 08:43:03.574425 systemd-logind[1147]: Removed session 21. May 13 08:43:07.448000 audit[5223]: NETFILTER_CFG table=filter:122 family=2 entries=20 op=nft_register_rule pid=5223 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:43:07.451998 kernel: kauditd_printk_skb: 34 callbacks suppressed May 13 08:43:07.452094 kernel: audit: type=1325 audit(1747125787.448:1455): table=filter:122 family=2 entries=20 op=nft_register_rule pid=5223 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:43:07.448000 audit[5223]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe1d3ccec0 a2=0 a3=7ffe1d3cceac items=0 ppid=2066 pid=5223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:07.448000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:43:07.469006 kernel: audit: type=1300 audit(1747125787.448:1455): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe1d3ccec0 a2=0 a3=7ffe1d3cceac items=0 ppid=2066 pid=5223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:07.469117 kernel: audit: type=1327 audit(1747125787.448:1455): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:43:07.471000 audit[5223]: NETFILTER_CFG table=nat:123 family=2 entries=106 op=nft_register_chain pid=5223 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:43:07.478553 kernel: audit: type=1325 audit(1747125787.471:1456): table=nat:123 family=2 entries=106 op=nft_register_chain pid=5223 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:43:07.471000 audit[5223]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe1d3ccec0 a2=0 a3=7ffe1d3cceac items=0 ppid=2066 pid=5223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:07.471000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:43:07.490392 kernel: audit: type=1300 audit(1747125787.471:1456): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe1d3ccec0 a2=0 a3=7ffe1d3cceac items=0 ppid=2066 pid=5223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:07.490555 kernel: audit: type=1327 audit(1747125787.471:1456): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:43:08.543000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:43:08.543000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001518400 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:43:08.559624 kernel: audit: type=1400 audit(1747125788.543:1457): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:43:08.559723 kernel: audit: type=1300 audit(1747125788.543:1457): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001518400 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:43:08.574404 systemd[1]: Started sshd@21-172.24.4.14:22-172.24.4.1:51714.service. May 13 08:43:08.543000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:43:08.598749 kernel: audit: type=1327 audit(1747125788.543:1457): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:43:08.598904 kernel: audit: type=1400 audit(1747125788.548:1458): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:43:08.548000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:43:08.548000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002da48e0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:43:08.548000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:43:08.548000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:43:08.548000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001518700 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:43:08.548000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:43:08.549000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:43:08.549000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001518e20 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:43:08.549000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:43:08.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.14:22-172.24.4.1:51714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:43:09.297750 systemd[1]: run-containerd-runc-k8s.io-644bb87984673b39373ec4ba8c44c09fca429c2849b5090bcdf2609d55c97858-runc.4mb7Hp.mount: Deactivated successfully. May 13 08:43:10.060000 audit[5226]: USER_ACCT pid=5226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:10.063080 sshd[5226]: Accepted publickey for core from 172.24.4.1 port 51714 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:43:10.063000 audit[5226]: CRED_ACQ pid=5226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:10.063000 audit[5226]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe04e29ac0 a2=3 a3=0 items=0 ppid=1 pid=5226 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:10.063000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 08:43:10.065512 sshd[5226]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:43:10.076776 systemd-logind[1147]: New session 22 of user core. May 13 08:43:10.077080 systemd[1]: Started session-22.scope. May 13 08:43:10.091000 audit[5226]: USER_START pid=5226 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:10.095000 audit[5246]: CRED_ACQ pid=5246 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:10.972247 sshd[5226]: pam_unix(sshd:session): session closed for user core May 13 08:43:10.974000 audit[5226]: USER_END pid=5226 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:10.974000 audit[5226]: CRED_DISP pid=5226 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:10.979109 systemd[1]: sshd@21-172.24.4.14:22-172.24.4.1:51714.service: Deactivated successfully. May 13 08:43:10.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.14:22-172.24.4.1:51714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:43:10.981094 systemd[1]: session-22.scope: Deactivated successfully. May 13 08:43:10.983028 systemd-logind[1147]: Session 22 logged out. Waiting for processes to exit. May 13 08:43:10.986691 systemd-logind[1147]: Removed session 22. May 13 08:43:15.984033 systemd[1]: Started sshd@22-172.24.4.14:22-172.24.4.1:41002.service. May 13 08:43:15.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.14:22-172.24.4.1:41002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:43:16.003908 kernel: kauditd_printk_skb: 19 callbacks suppressed May 13 08:43:16.004118 kernel: audit: type=1130 audit(1747125795.984:1470): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.14:22-172.24.4.1:41002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:43:17.197000 audit[5258]: USER_ACCT pid=5258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:17.201710 sshd[5258]: Accepted publickey for core from 172.24.4.1 port 41002 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:43:17.224589 kernel: audit: type=1101 audit(1747125797.197:1471): pid=5258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:17.223000 audit[5258]: CRED_ACQ pid=5258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:17.226284 sshd[5258]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:43:17.240749 kernel: audit: type=1103 audit(1747125797.223:1472): pid=5258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:17.254463 kernel: audit: type=1006 audit(1747125797.224:1473): pid=5258 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 13 08:43:17.254675 kernel: audit: type=1300 audit(1747125797.224:1473): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb9dc5850 a2=3 a3=0 items=0 ppid=1 pid=5258 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:17.224000 audit[5258]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb9dc5850 a2=3 a3=0 items=0 ppid=1 pid=5258 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:17.271870 kernel: audit: type=1327 audit(1747125797.224:1473): proctitle=737368643A20636F7265205B707269765D May 13 08:43:17.224000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 08:43:17.286250 systemd-logind[1147]: New session 23 of user core. May 13 08:43:17.288199 systemd[1]: Started session-23.scope. May 13 08:43:17.300000 audit[5258]: USER_START pid=5258 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:17.309538 kernel: audit: type=1105 audit(1747125797.300:1474): pid=5258 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:17.309000 audit[5260]: CRED_ACQ pid=5260 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:17.317566 kernel: audit: type=1103 audit(1747125797.309:1475): pid=5260 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:18.229833 sshd[5258]: pam_unix(sshd:session): session closed for user core May 13 08:43:18.233000 audit[5258]: USER_END pid=5258 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:18.233000 audit[5258]: CRED_DISP pid=5258 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:18.257160 systemd[1]: sshd@22-172.24.4.14:22-172.24.4.1:41002.service: Deactivated successfully. May 13 08:43:18.259809 systemd[1]: session-23.scope: Deactivated successfully. May 13 08:43:18.268699 kernel: audit: type=1106 audit(1747125798.233:1476): pid=5258 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:18.268877 kernel: audit: type=1104 audit(1747125798.233:1477): pid=5258 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:18.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.14:22-172.24.4.1:41002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:43:18.269966 systemd-logind[1147]: Session 23 logged out. Waiting for processes to exit. May 13 08:43:18.272335 systemd-logind[1147]: Removed session 23. May 13 08:43:23.257347 systemd[1]: Started sshd@23-172.24.4.14:22-172.24.4.1:41014.service. May 13 08:43:23.280269 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 08:43:23.280688 kernel: audit: type=1130 audit(1747125803.257:1479): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.14:22-172.24.4.1:41014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:43:23.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.14:22-172.24.4.1:41014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:43:24.573000 audit[5281]: USER_ACCT pid=5281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:24.590684 kernel: audit: type=1101 audit(1747125804.573:1480): pid=5281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:24.590781 sshd[5281]: Accepted publickey for core from 172.24.4.1 port 41014 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:43:24.589000 audit[5281]: CRED_ACQ pid=5281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:24.591946 sshd[5281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:43:24.610138 kernel: audit: type=1103 audit(1747125804.589:1481): pid=5281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:24.623551 kernel: audit: type=1006 audit(1747125804.589:1482): pid=5281 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 13 08:43:24.589000 audit[5281]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc634d4850 a2=3 a3=0 items=0 ppid=1 pid=5281 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:24.645571 kernel: audit: type=1300 audit(1747125804.589:1482): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc634d4850 a2=3 a3=0 items=0 ppid=1 pid=5281 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:24.589000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 08:43:24.653607 kernel: audit: type=1327 audit(1747125804.589:1482): proctitle=737368643A20636F7265205B707269765D May 13 08:43:24.668940 systemd[1]: Started session-24.scope. May 13 08:43:24.670358 systemd-logind[1147]: New session 24 of user core. May 13 08:43:24.683000 audit[5281]: USER_START pid=5281 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:24.706533 kernel: audit: type=1105 audit(1747125804.683:1483): pid=5281 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:24.707000 audit[5283]: CRED_ACQ pid=5283 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:24.722540 kernel: audit: type=1103 audit(1747125804.707:1484): pid=5283 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:25.381369 sshd[5281]: pam_unix(sshd:session): session closed for user core May 13 08:43:25.383000 audit[5281]: USER_END pid=5281 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:25.391353 systemd-logind[1147]: Session 24 logged out. Waiting for processes to exit. May 13 08:43:25.400345 kernel: audit: type=1106 audit(1747125805.383:1485): pid=5281 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:25.400543 kernel: audit: type=1104 audit(1747125805.383:1486): pid=5281 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:25.383000 audit[5281]: CRED_DISP pid=5281 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:25.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.14:22-172.24.4.1:41014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:43:25.395094 systemd[1]: sshd@23-172.24.4.14:22-172.24.4.1:41014.service: Deactivated successfully. May 13 08:43:25.398365 systemd[1]: session-24.scope: Deactivated successfully. May 13 08:43:25.405763 systemd-logind[1147]: Removed session 24. May 13 08:43:30.409712 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 08:43:30.410806 kernel: audit: type=1130 audit(1747125810.391:1488): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.14:22-172.24.4.1:56006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:43:30.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.14:22-172.24.4.1:56006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:43:30.392876 systemd[1]: Started sshd@24-172.24.4.14:22-172.24.4.1:56006.service. May 13 08:43:31.740000 audit[5293]: USER_ACCT pid=5293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:31.743654 sshd[5293]: Accepted publickey for core from 172.24.4.1 port 56006 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:43:31.762630 kernel: audit: type=1101 audit(1747125811.740:1489): pid=5293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:31.763000 audit[5293]: CRED_ACQ pid=5293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:31.766838 sshd[5293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:43:31.791748 kernel: audit: type=1103 audit(1747125811.763:1490): pid=5293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:31.792183 kernel: audit: type=1006 audit(1747125811.763:1491): pid=5293 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 13 08:43:31.792342 kernel: audit: type=1300 audit(1747125811.763:1491): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3d7ab8b0 a2=3 a3=0 items=0 ppid=1 pid=5293 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:31.763000 audit[5293]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3d7ab8b0 a2=3 a3=0 items=0 ppid=1 pid=5293 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:31.763000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 08:43:31.819908 kernel: audit: type=1327 audit(1747125811.763:1491): proctitle=737368643A20636F7265205B707269765D May 13 08:43:31.825700 systemd-logind[1147]: New session 25 of user core. May 13 08:43:31.826596 systemd[1]: Started session-25.scope. May 13 08:43:31.841000 audit[5293]: USER_START pid=5293 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:31.853376 kernel: audit: type=1105 audit(1747125811.841:1492): pid=5293 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:31.851000 audit[5295]: CRED_ACQ pid=5295 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:31.861579 kernel: audit: type=1103 audit(1747125811.851:1493): pid=5295 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:32.632279 sshd[5293]: pam_unix(sshd:session): session closed for user core May 13 08:43:32.633000 audit[5293]: USER_END pid=5293 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:32.639587 systemd[1]: sshd@24-172.24.4.14:22-172.24.4.1:56006.service: Deactivated successfully. May 13 08:43:32.641422 systemd[1]: session-25.scope: Deactivated successfully. May 13 08:43:32.654573 kernel: audit: type=1106 audit(1747125812.633:1494): pid=5293 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:32.655574 systemd-logind[1147]: Session 25 logged out. Waiting for processes to exit. May 13 08:43:32.634000 audit[5293]: CRED_DISP pid=5293 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:32.671553 kernel: audit: type=1104 audit(1747125812.634:1495): pid=5293 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:32.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.14:22-172.24.4.1:56006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:43:32.673210 systemd-logind[1147]: Removed session 25. May 13 08:43:37.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.14:22-172.24.4.1:41988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:43:37.652567 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 08:43:37.652760 kernel: audit: type=1130 audit(1747125817.647:1497): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.14:22-172.24.4.1:41988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:43:37.647556 systemd[1]: Started sshd@25-172.24.4.14:22-172.24.4.1:41988.service. May 13 08:43:38.856000 audit[5326]: USER_ACCT pid=5326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:38.857683 sshd[5326]: Accepted publickey for core from 172.24.4.1 port 41988 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:43:38.872571 kernel: audit: type=1101 audit(1747125818.856:1498): pid=5326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:38.872000 audit[5326]: CRED_ACQ pid=5326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:38.874244 sshd[5326]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:43:38.888574 kernel: audit: type=1103 audit(1747125818.872:1499): pid=5326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:38.899540 kernel: audit: type=1006 audit(1747125818.872:1500): pid=5326 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 13 08:43:38.872000 audit[5326]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff964cea70 a2=3 a3=0 items=0 ppid=1 pid=5326 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:38.916756 kernel: audit: type=1300 audit(1747125818.872:1500): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff964cea70 a2=3 a3=0 items=0 ppid=1 pid=5326 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:38.872000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 08:43:38.923538 kernel: audit: type=1327 audit(1747125818.872:1500): proctitle=737368643A20636F7265205B707269765D May 13 08:43:38.934185 systemd-logind[1147]: New session 26 of user core. May 13 08:43:38.936133 systemd[1]: Started session-26.scope. May 13 08:43:38.952000 audit[5326]: USER_START pid=5326 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:38.969632 kernel: audit: type=1105 audit(1747125818.952:1501): pid=5326 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:38.969819 kernel: audit: type=1103 audit(1747125818.968:1502): pid=5328 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:38.968000 audit[5328]: CRED_ACQ pid=5328 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:39.339945 systemd[1]: run-containerd-runc-k8s.io-644bb87984673b39373ec4ba8c44c09fca429c2849b5090bcdf2609d55c97858-runc.oz4gT3.mount: Deactivated successfully. May 13 08:43:39.640698 sshd[5326]: pam_unix(sshd:session): session closed for user core May 13 08:43:39.642000 audit[5326]: USER_END pid=5326 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:39.666564 kernel: audit: type=1106 audit(1747125819.642:1503): pid=5326 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:39.643000 audit[5326]: CRED_DISP pid=5326 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:39.681573 kernel: audit: type=1104 audit(1747125819.643:1504): pid=5326 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:43:39.681773 systemd[1]: sshd@25-172.24.4.14:22-172.24.4.1:41988.service: Deactivated successfully. May 13 08:43:39.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.14:22-172.24.4.1:41988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:43:39.684226 systemd[1]: session-26.scope: Deactivated successfully. May 13 08:43:39.685973 systemd-logind[1147]: Session 26 logged out. Waiting for processes to exit. May 13 08:43:39.691360 systemd-logind[1147]: Removed session 26. May 13 08:43:52.363083 systemd[1]: run-containerd-runc-k8s.io-644bb87984673b39373ec4ba8c44c09fca429c2849b5090bcdf2609d55c97858-runc.RyDVYs.mount: Deactivated successfully. May 13 08:44:01.924533 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 08:44:01.924705 kernel: audit: type=1400 audit(1747125841.908:1506): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:44:01.908000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:44:01.913393 systemd[1]: run-containerd-runc-k8s.io-330ff46edc8b367c3954a29016aa2b66a3bef771202384c5641f8b80ded0ecc1-runc.5lojfu.mount: Deactivated successfully. May 13 08:44:01.908000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00225dc80 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:44:01.939601 kernel: audit: type=1300 audit(1747125841.908:1506): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00225dc80 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:44:01.908000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:44:01.909000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:44:01.953819 kernel: audit: type=1327 audit(1747125841.908:1506): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:44:01.953907 kernel: audit: type=1400 audit(1747125841.909:1507): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:44:01.958567 kernel: audit: type=1300 audit(1747125841.909:1507): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002277dc0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:44:01.909000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002277dc0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:44:01.909000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:44:01.975590 kernel: audit: type=1327 audit(1747125841.909:1507): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:44:02.391000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:44:02.408576 kernel: audit: type=1400 audit(1747125842.391:1508): avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:44:02.391000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00b5ce420 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:44:02.391000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:44:02.445613 kernel: audit: type=1300 audit(1747125842.391:1508): arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00b5ce420 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:44:02.445797 kernel: audit: type=1327 audit(1747125842.391:1508): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:44:02.445885 kernel: audit: type=1400 audit(1747125842.392:1509): avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:44:02.392000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:44:02.392000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00ac9cd20 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:44:02.392000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:44:02.392000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7295 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:44:02.392000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00ff4ef60 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:44:02.392000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:44:02.408000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7301 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:44:02.408000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00ac9cde0 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:44:02.408000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:44:02.478000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:44:02.478000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00b5ce5a0 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:44:02.478000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:44:02.479000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:44:02.479000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00ac9d2f0 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:44:02.479000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:44:02.729000 audit[4093]: AVC avc: denied { watch } for pid=4093 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_08_38_35.3782379492/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c400,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c400,c861 tclass=file permissive=0 May 13 08:44:02.729000 audit[4093]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c82160 a2=fc6 a3=0 items=0 ppid=3312 pid=4093 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c400,c861 key=(null) May 13 08:44:02.729000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 08:44:03.142000 audit[4131]: AVC avc: denied { watch } for pid=4131 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_08_38_35.775369572/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c241 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c43,c241 tclass=file permissive=0 May 13 08:44:03.142000 audit[4131]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001de0c00 a2=fc6 a3=0 items=0 ppid=3356 pid=4131 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c241 key=(null) May 13 08:44:03.142000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 08:44:08.546000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:44:08.551073 kernel: kauditd_printk_skb: 20 callbacks suppressed May 13 08:44:08.551440 kernel: audit: type=1400 audit(1747125848.546:1516): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:44:08.546000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0009d96a0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:44:08.546000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:44:08.577891 kernel: audit: type=1300 audit(1747125848.546:1516): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0009d96a0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:44:08.577979 kernel: audit: type=1327 audit(1747125848.546:1516): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:44:08.550000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:44:08.583787 kernel: audit: type=1400 audit(1747125848.550:1517): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:44:08.583945 kernel: audit: type=1300 audit(1747125848.550:1517): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00040e000 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:44:08.550000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00040e000 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:44:08.550000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:44:08.598048 kernel: audit: type=1327 audit(1747125848.550:1517): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:44:08.598116 kernel: audit: type=1400 audit(1747125848.550:1518): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:44:08.550000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:44:08.550000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00040e0c0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:44:08.611650 kernel: audit: type=1300 audit(1747125848.550:1518): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00040e0c0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:44:08.611755 kernel: audit: type=1327 audit(1747125848.550:1518): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:44:08.550000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:44:08.550000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:44:08.628563 kernel: audit: type=1400 audit(1747125848.550:1519): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:44:08.550000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00040e120 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:44:08.550000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:44:09.293270 systemd[1]: run-containerd-runc-k8s.io-644bb87984673b39373ec4ba8c44c09fca429c2849b5090bcdf2609d55c97858-runc.iIubnC.mount: Deactivated successfully. May 13 08:44:31.904841 systemd[1]: run-containerd-runc-k8s.io-330ff46edc8b367c3954a29016aa2b66a3bef771202384c5641f8b80ded0ecc1-runc.Ojcp6C.mount: Deactivated successfully. May 13 08:44:39.334670 systemd[1]: run-containerd-runc-k8s.io-644bb87984673b39373ec4ba8c44c09fca429c2849b5090bcdf2609d55c97858-runc.lHREdt.mount: Deactivated successfully. May 13 08:44:52.405205 systemd[1]: run-containerd-runc-k8s.io-644bb87984673b39373ec4ba8c44c09fca429c2849b5090bcdf2609d55c97858-runc.Jdn90S.mount: Deactivated successfully. May 13 08:45:01.889118 systemd[1]: run-containerd-runc-k8s.io-330ff46edc8b367c3954a29016aa2b66a3bef771202384c5641f8b80ded0ecc1-runc.t1Pnca.mount: Deactivated successfully. May 13 08:45:01.928674 kernel: kauditd_printk_skb: 2 callbacks suppressed May 13 08:45:01.929058 kernel: audit: type=1400 audit(1747125901.909:1520): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:45:01.909000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:45:01.909000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a080f0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:45:01.938630 kernel: audit: type=1300 audit(1747125901.909:1520): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a080f0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:45:01.938954 kernel: audit: type=1327 audit(1747125901.909:1520): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:45:01.909000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:45:01.910000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:45:01.956731 kernel: audit: type=1400 audit(1747125901.910:1521): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:45:01.956949 kernel: audit: type=1300 audit(1747125901.910:1521): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a317c0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:45:01.910000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a317c0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:45:01.964582 kernel: audit: type=1327 audit(1747125901.910:1521): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:45:01.910000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:45:02.394000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:45:02.394000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:45:02.425045 kernel: audit: type=1400 audit(1747125902.394:1522): avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:45:02.425255 kernel: audit: type=1400 audit(1747125902.394:1523): avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:45:02.425343 kernel: audit: type=1300 audit(1747125902.394:1523): arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c01230bf20 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:45:02.394000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c01230bf20 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:45:02.394000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:45:02.460379 kernel: audit: type=1327 audit(1747125902.394:1523): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:45:02.398000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7295 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:45:02.398000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00c84f830 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:45:02.398000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:45:02.394000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00cd05a40 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:45:02.394000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:45:02.411000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7301 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:45:02.411000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00c84f9b0 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:45:02.411000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:45:02.479000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:45:02.479000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c012ba6060 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:45:02.479000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:45:02.480000 audit[1813]: AVC avc: denied { watch } for pid=1813 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:45:02.480000 audit[1813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00c84faa0 a2=fc6 a3=0 items=0 ppid=1675 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c113,c621 key=(null) May 13 08:45:02.480000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 13 08:45:02.732000 audit[4093]: AVC avc: denied { watch } for pid=4093 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_08_38_35.3782379492/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c400,c861 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c400,c861 tclass=file permissive=0 May 13 08:45:02.732000 audit[4093]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c82800 a2=fc6 a3=0 items=0 ppid=3312 pid=4093 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c400,c861 key=(null) May 13 08:45:02.732000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 08:45:03.144000 audit[4131]: AVC avc: denied { watch } for pid=4131 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_08_38_35.775369572/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c43,c241 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c43,c241 tclass=file permissive=0 May 13 08:45:03.144000 audit[4131]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00119b800 a2=fc6 a3=0 items=0 ppid=3356 pid=4131 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c43,c241 key=(null) May 13 08:45:03.144000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 08:45:08.547000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:45:08.551161 kernel: kauditd_printk_skb: 20 callbacks suppressed May 13 08:45:08.551338 kernel: audit: type=1400 audit(1747125908.547:1530): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:45:08.547000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014401c0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:45:08.583975 kernel: audit: type=1300 audit(1747125908.547:1530): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014401c0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:45:08.584191 kernel: audit: type=1327 audit(1747125908.547:1530): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:45:08.547000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:45:08.552000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:45:08.614253 kernel: audit: type=1400 audit(1747125908.552:1531): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:45:08.614406 kernel: audit: type=1300 audit(1747125908.552:1531): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001440220 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:45:08.552000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001440220 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:45:08.628617 kernel: audit: type=1327 audit(1747125908.552:1531): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:45:08.552000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:45:08.634977 kernel: audit: type=1400 audit(1747125908.553:1532): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:45:08.553000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:45:08.640545 kernel: audit: type=1300 audit(1747125908.553:1532): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014405c0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:45:08.553000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014405c0 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:45:08.553000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:45:08.659524 kernel: audit: type=1327 audit(1747125908.553:1532): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:45:08.659684 kernel: audit: type=1400 audit(1747125908.554:1533): avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:45:08.554000 audit[1770]: AVC avc: denied { watch } for pid=1770 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 08:45:08.554000 audit[1770]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002092660 a2=fc6 a3=0 items=0 ppid=1638 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c786,c867 key=(null) May 13 08:45:08.554000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 08:45:09.331536 systemd[1]: run-containerd-runc-k8s.io-644bb87984673b39373ec4ba8c44c09fca429c2849b5090bcdf2609d55c97858-runc.vyF3Sx.mount: Deactivated successfully. May 13 08:45:31.910263 systemd[1]: run-containerd-runc-k8s.io-330ff46edc8b367c3954a29016aa2b66a3bef771202384c5641f8b80ded0ecc1-runc.RgYNgl.mount: Deactivated successfully.