May 15 09:18:26.889960 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Wed May 14 23:14:51 -00 2025 May 15 09:18:26.889989 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=bd2e5c4f6706621ae2eebb207adba6951c52e019661e3e87d19fb6c7284acf54 May 15 09:18:26.889998 kernel: BIOS-provided physical RAM map: May 15 09:18:26.890008 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 15 09:18:26.890015 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 15 09:18:26.890022 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 15 09:18:26.890029 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdcfff] usable May 15 09:18:26.890036 kernel: BIOS-e820: [mem 0x00000000bffdd000-0x00000000bfffffff] reserved May 15 09:18:26.890043 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 15 09:18:26.890049 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 15 09:18:26.890056 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable May 15 09:18:26.890062 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved May 15 09:18:26.890070 kernel: NX (Execute Disable) protection: active May 15 09:18:26.890077 kernel: SMBIOS 3.0.0 present. May 15 09:18:26.890085 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.16.3-debian-1.16.3-2 04/01/2014 May 15 09:18:26.890092 kernel: Hypervisor detected: KVM May 15 09:18:26.890099 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 15 09:18:26.890106 kernel: kvm-clock: cpu 0, msr 2a196001, primary cpu clock May 15 09:18:26.890114 kernel: kvm-clock: using sched offset of 4045518955 cycles May 15 09:18:26.890122 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 15 09:18:26.890129 kernel: tsc: Detected 1996.249 MHz processor May 15 09:18:26.890137 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 15 09:18:26.890144 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 15 09:18:26.890152 kernel: last_pfn = 0x140000 max_arch_pfn = 0x400000000 May 15 09:18:26.890159 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 15 09:18:26.890166 kernel: last_pfn = 0xbffdd max_arch_pfn = 0x400000000 May 15 09:18:26.890173 kernel: ACPI: Early table checksum verification disabled May 15 09:18:26.890182 kernel: ACPI: RSDP 0x00000000000F51E0 000014 (v00 BOCHS ) May 15 09:18:26.890190 kernel: ACPI: RSDT 0x00000000BFFE1B65 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 09:18:26.890197 kernel: ACPI: FACP 0x00000000BFFE1A49 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 09:18:26.890204 kernel: ACPI: DSDT 0x00000000BFFE0040 001A09 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 09:18:26.890211 kernel: ACPI: FACS 0x00000000BFFE0000 000040 May 15 09:18:26.890218 kernel: ACPI: APIC 0x00000000BFFE1ABD 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 15 09:18:26.890226 kernel: ACPI: WAET 0x00000000BFFE1B3D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 09:18:26.890233 kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1a49-0xbffe1abc] May 15 09:18:26.890242 kernel: ACPI: Reserving DSDT table memory at [mem 0xbffe0040-0xbffe1a48] May 15 09:18:26.890249 kernel: ACPI: Reserving FACS table memory at [mem 0xbffe0000-0xbffe003f] May 15 09:18:26.890257 kernel: ACPI: Reserving APIC table memory at [mem 0xbffe1abd-0xbffe1b3c] May 15 09:18:26.890264 kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1b3d-0xbffe1b64] May 15 09:18:26.890272 kernel: No NUMA configuration found May 15 09:18:26.890282 kernel: Faking a node at [mem 0x0000000000000000-0x000000013fffffff] May 15 09:18:26.890289 kernel: NODE_DATA(0) allocated [mem 0x13fff7000-0x13fffcfff] May 15 09:18:26.890298 kernel: Zone ranges: May 15 09:18:26.890306 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 15 09:18:26.890313 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 15 09:18:26.890321 kernel: Normal [mem 0x0000000100000000-0x000000013fffffff] May 15 09:18:26.890328 kernel: Movable zone start for each node May 15 09:18:26.890336 kernel: Early memory node ranges May 15 09:18:26.890343 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 15 09:18:26.890351 kernel: node 0: [mem 0x0000000000100000-0x00000000bffdcfff] May 15 09:18:26.890360 kernel: node 0: [mem 0x0000000100000000-0x000000013fffffff] May 15 09:18:26.890367 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000013fffffff] May 15 09:18:26.890375 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 15 09:18:26.890382 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 15 09:18:26.890390 kernel: On node 0, zone Normal: 35 pages in unavailable ranges May 15 09:18:26.890397 kernel: ACPI: PM-Timer IO Port: 0x608 May 15 09:18:26.890405 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 15 09:18:26.890413 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 15 09:18:26.890420 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 15 09:18:26.890430 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 15 09:18:26.890437 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 15 09:18:26.890445 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 15 09:18:26.890452 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 15 09:18:26.890460 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 15 09:18:26.890467 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 15 09:18:26.890475 kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices May 15 09:18:26.890483 kernel: Booting paravirtualized kernel on KVM May 15 09:18:26.890490 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 15 09:18:26.890500 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 15 09:18:26.890507 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 15 09:18:26.890514 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 15 09:18:26.890542 kernel: pcpu-alloc: [0] 0 1 May 15 09:18:26.890551 kernel: kvm-guest: stealtime: cpu 0, msr 13bc1c0c0 May 15 09:18:26.890559 kernel: kvm-guest: PV spinlocks disabled, no host support May 15 09:18:26.890566 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1031901 May 15 09:18:26.890574 kernel: Policy zone: Normal May 15 09:18:26.890583 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=bd2e5c4f6706621ae2eebb207adba6951c52e019661e3e87d19fb6c7284acf54 May 15 09:18:26.890593 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 15 09:18:26.890601 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 15 09:18:26.890609 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 15 09:18:26.890616 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 15 09:18:26.890624 kernel: Memory: 3968276K/4193772K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 225236K reserved, 0K cma-reserved) May 15 09:18:26.890632 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 15 09:18:26.890639 kernel: ftrace: allocating 34584 entries in 136 pages May 15 09:18:26.890647 kernel: ftrace: allocated 136 pages with 2 groups May 15 09:18:26.890655 kernel: rcu: Hierarchical RCU implementation. May 15 09:18:26.890664 kernel: rcu: RCU event tracing is enabled. May 15 09:18:26.890671 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 15 09:18:26.890679 kernel: Rude variant of Tasks RCU enabled. May 15 09:18:26.890687 kernel: Tracing variant of Tasks RCU enabled. May 15 09:18:26.890694 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 15 09:18:26.890702 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 15 09:18:26.890710 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 15 09:18:26.890717 kernel: Console: colour VGA+ 80x25 May 15 09:18:26.890726 kernel: printk: console [tty0] enabled May 15 09:18:26.890734 kernel: printk: console [ttyS0] enabled May 15 09:18:26.890741 kernel: ACPI: Core revision 20210730 May 15 09:18:26.890748 kernel: APIC: Switch to symmetric I/O mode setup May 15 09:18:26.890756 kernel: x2apic enabled May 15 09:18:26.890764 kernel: Switched APIC routing to physical x2apic. May 15 09:18:26.890771 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 15 09:18:26.890779 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 15 09:18:26.890787 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) May 15 09:18:26.890796 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 May 15 09:18:26.890804 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 May 15 09:18:26.890811 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 15 09:18:26.890819 kernel: Spectre V2 : Mitigation: Retpolines May 15 09:18:26.890827 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 15 09:18:26.890835 kernel: Speculative Store Bypass: Vulnerable May 15 09:18:26.890842 kernel: x86/fpu: x87 FPU will use FXSAVE May 15 09:18:26.890849 kernel: Freeing SMP alternatives memory: 32K May 15 09:18:26.890857 kernel: pid_max: default: 32768 minimum: 301 May 15 09:18:26.890866 kernel: LSM: Security Framework initializing May 15 09:18:26.890874 kernel: SELinux: Initializing. May 15 09:18:26.890881 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 09:18:26.890889 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 09:18:26.890896 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) May 15 09:18:26.890904 kernel: Performance Events: AMD PMU driver. May 15 09:18:26.890918 kernel: ... version: 0 May 15 09:18:26.890927 kernel: ... bit width: 48 May 15 09:18:26.890934 kernel: ... generic registers: 4 May 15 09:18:26.890942 kernel: ... value mask: 0000ffffffffffff May 15 09:18:26.890950 kernel: ... max period: 00007fffffffffff May 15 09:18:26.890958 kernel: ... fixed-purpose events: 0 May 15 09:18:26.890967 kernel: ... event mask: 000000000000000f May 15 09:18:26.890975 kernel: signal: max sigframe size: 1440 May 15 09:18:26.890983 kernel: rcu: Hierarchical SRCU implementation. May 15 09:18:26.890991 kernel: smp: Bringing up secondary CPUs ... May 15 09:18:26.890998 kernel: x86: Booting SMP configuration: May 15 09:18:26.891008 kernel: .... node #0, CPUs: #1 May 15 09:18:26.891016 kernel: kvm-clock: cpu 1, msr 2a196041, secondary cpu clock May 15 09:18:26.891024 kernel: kvm-guest: stealtime: cpu 1, msr 13bd1c0c0 May 15 09:18:26.891032 kernel: smp: Brought up 1 node, 2 CPUs May 15 09:18:26.891039 kernel: smpboot: Max logical packages: 2 May 15 09:18:26.891047 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) May 15 09:18:26.891055 kernel: devtmpfs: initialized May 15 09:18:26.891063 kernel: x86/mm: Memory block size: 128MB May 15 09:18:26.891071 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 15 09:18:26.891081 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 15 09:18:26.891089 kernel: pinctrl core: initialized pinctrl subsystem May 15 09:18:26.891097 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 15 09:18:26.891104 kernel: audit: initializing netlink subsys (disabled) May 15 09:18:26.891112 kernel: audit: type=2000 audit(1747300705.627:1): state=initialized audit_enabled=0 res=1 May 15 09:18:26.891120 kernel: thermal_sys: Registered thermal governor 'step_wise' May 15 09:18:26.891128 kernel: thermal_sys: Registered thermal governor 'user_space' May 15 09:18:26.891136 kernel: cpuidle: using governor menu May 15 09:18:26.891144 kernel: ACPI: bus type PCI registered May 15 09:18:26.891156 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 15 09:18:26.891164 kernel: dca service started, version 1.12.1 May 15 09:18:26.891173 kernel: PCI: Using configuration type 1 for base access May 15 09:18:26.891181 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 15 09:18:26.891190 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 15 09:18:26.891198 kernel: ACPI: Added _OSI(Module Device) May 15 09:18:26.891206 kernel: ACPI: Added _OSI(Processor Device) May 15 09:18:26.891215 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 15 09:18:26.891223 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 15 09:18:26.891234 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 15 09:18:26.891242 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 15 09:18:26.891251 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 15 09:18:26.891259 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 15 09:18:26.891267 kernel: ACPI: Interpreter enabled May 15 09:18:26.891276 kernel: ACPI: PM: (supports S0 S3 S5) May 15 09:18:26.891284 kernel: ACPI: Using IOAPIC for interrupt routing May 15 09:18:26.891293 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 15 09:18:26.891302 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 15 09:18:26.891312 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 15 09:18:26.891467 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 15 09:18:26.891579 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 15 09:18:26.891593 kernel: acpiphp: Slot [3] registered May 15 09:18:26.891602 kernel: acpiphp: Slot [4] registered May 15 09:18:26.891611 kernel: acpiphp: Slot [5] registered May 15 09:18:26.891619 kernel: acpiphp: Slot [6] registered May 15 09:18:26.891628 kernel: acpiphp: Slot [7] registered May 15 09:18:26.891639 kernel: acpiphp: Slot [8] registered May 15 09:18:26.891648 kernel: acpiphp: Slot [9] registered May 15 09:18:26.891656 kernel: acpiphp: Slot [10] registered May 15 09:18:26.891664 kernel: acpiphp: Slot [11] registered May 15 09:18:26.891673 kernel: acpiphp: Slot [12] registered May 15 09:18:26.891681 kernel: acpiphp: Slot [13] registered May 15 09:18:26.891690 kernel: acpiphp: Slot [14] registered May 15 09:18:26.891698 kernel: acpiphp: Slot [15] registered May 15 09:18:26.891706 kernel: acpiphp: Slot [16] registered May 15 09:18:26.891716 kernel: acpiphp: Slot [17] registered May 15 09:18:26.891725 kernel: acpiphp: Slot [18] registered May 15 09:18:26.891733 kernel: acpiphp: Slot [19] registered May 15 09:18:26.891741 kernel: acpiphp: Slot [20] registered May 15 09:18:26.891750 kernel: acpiphp: Slot [21] registered May 15 09:18:26.891758 kernel: acpiphp: Slot [22] registered May 15 09:18:26.891766 kernel: acpiphp: Slot [23] registered May 15 09:18:26.891775 kernel: acpiphp: Slot [24] registered May 15 09:18:26.891783 kernel: acpiphp: Slot [25] registered May 15 09:18:26.891791 kernel: acpiphp: Slot [26] registered May 15 09:18:26.891801 kernel: acpiphp: Slot [27] registered May 15 09:18:26.891810 kernel: acpiphp: Slot [28] registered May 15 09:18:26.891818 kernel: acpiphp: Slot [29] registered May 15 09:18:26.891826 kernel: acpiphp: Slot [30] registered May 15 09:18:26.891835 kernel: acpiphp: Slot [31] registered May 15 09:18:26.891843 kernel: PCI host bridge to bus 0000:00 May 15 09:18:26.891938 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 15 09:18:26.892021 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 15 09:18:26.892103 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 15 09:18:26.892181 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 15 09:18:26.892259 kernel: pci_bus 0000:00: root bus resource [mem 0xc000000000-0xc07fffffff window] May 15 09:18:26.892337 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 15 09:18:26.892440 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 15 09:18:26.892557 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 15 09:18:26.892664 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 May 15 09:18:26.892767 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] May 15 09:18:26.892857 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 15 09:18:26.892942 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 15 09:18:26.893033 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 15 09:18:26.893119 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 15 09:18:26.893215 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 May 15 09:18:26.893308 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI May 15 09:18:26.893396 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB May 15 09:18:26.893492 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 May 15 09:18:26.893600 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] May 15 09:18:26.893693 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xc000000000-0xc000003fff 64bit pref] May 15 09:18:26.893784 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] May 15 09:18:26.893873 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] May 15 09:18:26.893966 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 15 09:18:26.894072 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 May 15 09:18:26.894162 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] May 15 09:18:26.894249 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] May 15 09:18:26.894337 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xc000004000-0xc000007fff 64bit pref] May 15 09:18:26.894425 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] May 15 09:18:26.894541 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 May 15 09:18:26.894640 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] May 15 09:18:26.894729 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] May 15 09:18:26.894816 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xc000008000-0xc00000bfff 64bit pref] May 15 09:18:26.894915 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 May 15 09:18:26.895003 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] May 15 09:18:26.895090 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xc00000c000-0xc00000ffff 64bit pref] May 15 09:18:26.895190 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 May 15 09:18:26.895280 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] May 15 09:18:26.895367 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfeb93000-0xfeb93fff] May 15 09:18:26.895454 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xc000010000-0xc000013fff 64bit pref] May 15 09:18:26.895467 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 15 09:18:26.895476 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 15 09:18:26.895485 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 15 09:18:26.895493 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 15 09:18:26.895505 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 15 09:18:26.895514 kernel: iommu: Default domain type: Translated May 15 09:18:26.900675 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 15 09:18:26.900854 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device May 15 09:18:26.900951 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 15 09:18:26.901043 kernel: pci 0000:00:02.0: vgaarb: bridge control possible May 15 09:18:26.901057 kernel: vgaarb: loaded May 15 09:18:26.901066 kernel: pps_core: LinuxPPS API ver. 1 registered May 15 09:18:26.901076 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 15 09:18:26.901095 kernel: PTP clock support registered May 15 09:18:26.901104 kernel: PCI: Using ACPI for IRQ routing May 15 09:18:26.901113 kernel: PCI: pci_cache_line_size set to 64 bytes May 15 09:18:26.901122 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 15 09:18:26.901131 kernel: e820: reserve RAM buffer [mem 0xbffdd000-0xbfffffff] May 15 09:18:26.901139 kernel: clocksource: Switched to clocksource kvm-clock May 15 09:18:26.901148 kernel: VFS: Disk quotas dquot_6.6.0 May 15 09:18:26.901157 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 15 09:18:26.901166 kernel: pnp: PnP ACPI init May 15 09:18:26.901265 kernel: pnp 00:03: [dma 2] May 15 09:18:26.901279 kernel: pnp: PnP ACPI: found 5 devices May 15 09:18:26.901288 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 15 09:18:26.901297 kernel: NET: Registered PF_INET protocol family May 15 09:18:26.901306 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 15 09:18:26.901315 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 15 09:18:26.901324 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 15 09:18:26.901333 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 15 09:18:26.901347 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 15 09:18:26.901355 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 15 09:18:26.901364 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 09:18:26.901373 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 09:18:26.901382 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 15 09:18:26.901391 kernel: NET: Registered PF_XDP protocol family May 15 09:18:26.901475 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 15 09:18:26.901574 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 15 09:18:26.901654 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 15 09:18:26.901737 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] May 15 09:18:26.901817 kernel: pci_bus 0000:00: resource 8 [mem 0xc000000000-0xc07fffffff window] May 15 09:18:26.901910 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release May 15 09:18:26.902004 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 15 09:18:26.902092 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 15 09:18:26.902105 kernel: PCI: CLS 0 bytes, default 64 May 15 09:18:26.902114 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 15 09:18:26.902123 kernel: software IO TLB: mapped [mem 0x00000000bbfdd000-0x00000000bffdd000] (64MB) May 15 09:18:26.902136 kernel: Initialise system trusted keyrings May 15 09:18:26.902145 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 15 09:18:26.902154 kernel: Key type asymmetric registered May 15 09:18:26.902162 kernel: Asymmetric key parser 'x509' registered May 15 09:18:26.902171 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 15 09:18:26.902180 kernel: io scheduler mq-deadline registered May 15 09:18:26.902189 kernel: io scheduler kyber registered May 15 09:18:26.902197 kernel: io scheduler bfq registered May 15 09:18:26.902206 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 15 09:18:26.902219 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 May 15 09:18:26.902228 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 May 15 09:18:26.902237 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 15 09:18:26.902246 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 May 15 09:18:26.902254 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 15 09:18:26.902263 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 15 09:18:26.902272 kernel: random: crng init done May 15 09:18:26.902281 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 15 09:18:26.902290 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 15 09:18:26.902302 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 15 09:18:26.902310 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 15 09:18:26.902401 kernel: rtc_cmos 00:04: RTC can wake from S4 May 15 09:18:26.902482 kernel: rtc_cmos 00:04: registered as rtc0 May 15 09:18:26.904491 kernel: rtc_cmos 00:04: setting system clock to 2025-05-15T09:18:26 UTC (1747300706) May 15 09:18:26.904598 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram May 15 09:18:26.904612 kernel: NET: Registered PF_INET6 protocol family May 15 09:18:26.904621 kernel: Segment Routing with IPv6 May 15 09:18:26.904634 kernel: In-situ OAM (IOAM) with IPv6 May 15 09:18:26.904643 kernel: NET: Registered PF_PACKET protocol family May 15 09:18:26.904652 kernel: Key type dns_resolver registered May 15 09:18:26.904661 kernel: IPI shorthand broadcast: enabled May 15 09:18:26.904669 kernel: sched_clock: Marking stable (881685928, 169735437)->(1153748455, -102327090) May 15 09:18:26.904678 kernel: registered taskstats version 1 May 15 09:18:26.904688 kernel: Loading compiled-in X.509 certificates May 15 09:18:26.904697 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: a3400373b5c34ccb74f940604f224840f2b40bdd' May 15 09:18:26.904705 kernel: Key type .fscrypt registered May 15 09:18:26.904729 kernel: Key type fscrypt-provisioning registered May 15 09:18:26.904741 kernel: ima: No TPM chip found, activating TPM-bypass! May 15 09:18:26.904750 kernel: ima: Allocated hash algorithm: sha1 May 15 09:18:26.904758 kernel: ima: No architecture policies found May 15 09:18:26.904767 kernel: clk: Disabling unused clocks May 15 09:18:26.904775 kernel: Freeing unused kernel image (initmem) memory: 47456K May 15 09:18:26.904784 kernel: Write protecting the kernel read-only data: 28672k May 15 09:18:26.904793 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 15 09:18:26.904804 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 15 09:18:26.904812 kernel: Run /init as init process May 15 09:18:26.904821 kernel: with arguments: May 15 09:18:26.904830 kernel: /init May 15 09:18:26.904838 kernel: with environment: May 15 09:18:26.904847 kernel: HOME=/ May 15 09:18:26.904855 kernel: TERM=linux May 15 09:18:26.904863 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 15 09:18:26.904876 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 09:18:26.904890 systemd[1]: Detected virtualization kvm. May 15 09:18:26.904899 systemd[1]: Detected architecture x86-64. May 15 09:18:26.904908 systemd[1]: Running in initrd. May 15 09:18:26.904918 systemd[1]: No hostname configured, using default hostname. May 15 09:18:26.904927 systemd[1]: Hostname set to . May 15 09:18:26.904937 systemd[1]: Initializing machine ID from VM UUID. May 15 09:18:26.904946 systemd[1]: Queued start job for default target initrd.target. May 15 09:18:26.904959 systemd[1]: Started systemd-ask-password-console.path. May 15 09:18:26.904968 systemd[1]: Reached target cryptsetup.target. May 15 09:18:26.904977 systemd[1]: Reached target paths.target. May 15 09:18:26.904986 systemd[1]: Reached target slices.target. May 15 09:18:26.904995 systemd[1]: Reached target swap.target. May 15 09:18:26.905004 systemd[1]: Reached target timers.target. May 15 09:18:26.905014 systemd[1]: Listening on iscsid.socket. May 15 09:18:26.905023 systemd[1]: Listening on iscsiuio.socket. May 15 09:18:26.905035 systemd[1]: Listening on systemd-journald-audit.socket. May 15 09:18:26.905056 systemd[1]: Listening on systemd-journald-dev-log.socket. May 15 09:18:26.905067 systemd[1]: Listening on systemd-journald.socket. May 15 09:18:26.905077 systemd[1]: Listening on systemd-networkd.socket. May 15 09:18:26.905086 systemd[1]: Listening on systemd-udevd-control.socket. May 15 09:18:26.905095 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 09:18:26.905107 systemd[1]: Reached target sockets.target. May 15 09:18:26.905116 systemd[1]: Starting kmod-static-nodes.service... May 15 09:18:26.905126 systemd[1]: Finished network-cleanup.service. May 15 09:18:26.905135 systemd[1]: Starting systemd-fsck-usr.service... May 15 09:18:26.905145 systemd[1]: Starting systemd-journald.service... May 15 09:18:26.905154 systemd[1]: Starting systemd-modules-load.service... May 15 09:18:26.905163 systemd[1]: Starting systemd-resolved.service... May 15 09:18:26.905173 systemd[1]: Starting systemd-vconsole-setup.service... May 15 09:18:26.905182 systemd[1]: Finished kmod-static-nodes.service. May 15 09:18:26.905199 systemd-journald[185]: Journal started May 15 09:18:26.905256 systemd-journald[185]: Runtime Journal (/run/log/journal/06d60d5f756149509b01b198ffdcb5ea) is 8.0M, max 78.4M, 70.4M free. May 15 09:18:26.895572 systemd-modules-load[186]: Inserted module 'overlay' May 15 09:18:26.942792 systemd[1]: Started systemd-journald.service. May 15 09:18:26.942821 kernel: audit: type=1130 audit(1747300706.922:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:26.942836 kernel: audit: type=1130 audit(1747300706.931:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:26.942848 kernel: audit: type=1130 audit(1747300706.932:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:26.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:26.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:26.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:26.902095 systemd-resolved[187]: Positive Trust Anchors: May 15 09:18:26.902106 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 09:18:26.949949 kernel: audit: type=1130 audit(1747300706.943:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:26.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:26.902145 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 09:18:26.960760 kernel: audit: type=1130 audit(1747300706.949:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:26.960779 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 15 09:18:26.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:26.912237 systemd-resolved[187]: Defaulting to hostname 'linux'. May 15 09:18:26.932643 systemd[1]: Started systemd-resolved.service. May 15 09:18:26.933273 systemd[1]: Finished systemd-fsck-usr.service. May 15 09:18:26.944520 systemd[1]: Finished systemd-vconsole-setup.service. May 15 09:18:26.950602 systemd[1]: Reached target nss-lookup.target. May 15 09:18:26.962262 systemd[1]: Starting dracut-cmdline-ask.service... May 15 09:18:26.964239 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 09:18:26.969776 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 09:18:26.978733 kernel: audit: type=1130 audit(1747300706.969:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:26.978773 kernel: Bridge firewalling registered May 15 09:18:26.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:26.977333 systemd-modules-load[186]: Inserted module 'br_netfilter' May 15 09:18:26.986698 systemd[1]: Finished dracut-cmdline-ask.service. May 15 09:18:26.987941 systemd[1]: Starting dracut-cmdline.service... May 15 09:18:26.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:26.995061 kernel: audit: type=1130 audit(1747300706.986:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:27.001414 dracut-cmdline[203]: dracut-dracut-053 May 15 09:18:27.003810 dracut-cmdline[203]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=bd2e5c4f6706621ae2eebb207adba6951c52e019661e3e87d19fb6c7284acf54 May 15 09:18:27.009555 kernel: SCSI subsystem initialized May 15 09:18:27.024707 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 15 09:18:27.024768 kernel: device-mapper: uevent: version 1.0.3 May 15 09:18:27.027008 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 15 09:18:27.031989 systemd-modules-load[186]: Inserted module 'dm_multipath' May 15 09:18:27.032912 systemd[1]: Finished systemd-modules-load.service. May 15 09:18:27.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:27.035480 systemd[1]: Starting systemd-sysctl.service... May 15 09:18:27.043618 kernel: audit: type=1130 audit(1747300707.034:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:27.046722 systemd[1]: Finished systemd-sysctl.service. May 15 09:18:27.053301 kernel: audit: type=1130 audit(1747300707.046:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:27.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:27.080571 kernel: Loading iSCSI transport class v2.0-870. May 15 09:18:27.101622 kernel: iscsi: registered transport (tcp) May 15 09:18:27.130116 kernel: iscsi: registered transport (qla4xxx) May 15 09:18:27.130278 kernel: QLogic iSCSI HBA Driver May 15 09:18:27.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:27.179586 systemd[1]: Finished dracut-cmdline.service. May 15 09:18:27.182720 systemd[1]: Starting dracut-pre-udev.service... May 15 09:18:27.271626 kernel: raid6: sse2x4 gen() 5762 MB/s May 15 09:18:27.289634 kernel: raid6: sse2x4 xor() 6513 MB/s May 15 09:18:27.307619 kernel: raid6: sse2x2 gen() 13917 MB/s May 15 09:18:27.325608 kernel: raid6: sse2x2 xor() 8399 MB/s May 15 09:18:27.343637 kernel: raid6: sse2x1 gen() 11099 MB/s May 15 09:18:27.362090 kernel: raid6: sse2x1 xor() 6723 MB/s May 15 09:18:27.362156 kernel: raid6: using algorithm sse2x2 gen() 13917 MB/s May 15 09:18:27.362184 kernel: raid6: .... xor() 8399 MB/s, rmw enabled May 15 09:18:27.367323 kernel: raid6: using ssse3x2 recovery algorithm May 15 09:18:27.384402 kernel: xor: measuring software checksum speed May 15 09:18:27.384468 kernel: prefetch64-sse : 17051 MB/sec May 15 09:18:27.384586 kernel: generic_sse : 13912 MB/sec May 15 09:18:27.387306 kernel: xor: using function: prefetch64-sse (17051 MB/sec) May 15 09:18:27.505594 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 15 09:18:27.520149 systemd[1]: Finished dracut-pre-udev.service. May 15 09:18:27.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:27.521000 audit: BPF prog-id=7 op=LOAD May 15 09:18:27.521000 audit: BPF prog-id=8 op=LOAD May 15 09:18:27.523360 systemd[1]: Starting systemd-udevd.service... May 15 09:18:27.536899 systemd-udevd[385]: Using default interface naming scheme 'v252'. May 15 09:18:27.542022 systemd[1]: Started systemd-udevd.service. May 15 09:18:27.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:27.550138 systemd[1]: Starting dracut-pre-trigger.service... May 15 09:18:27.569117 dracut-pre-trigger[406]: rd.md=0: removing MD RAID activation May 15 09:18:27.618908 systemd[1]: Finished dracut-pre-trigger.service. May 15 09:18:27.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:27.622317 systemd[1]: Starting systemd-udev-trigger.service... May 15 09:18:27.666505 systemd[1]: Finished systemd-udev-trigger.service. May 15 09:18:27.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:27.727550 kernel: virtio_blk virtio2: [vda] 20971520 512-byte logical blocks (10.7 GB/10.0 GiB) May 15 09:18:27.816167 kernel: libata version 3.00 loaded. May 15 09:18:27.816191 kernel: ata_piix 0000:00:01.1: version 2.13 May 15 09:18:27.816313 kernel: scsi host0: ata_piix May 15 09:18:27.816425 kernel: scsi host1: ata_piix May 15 09:18:27.816554 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 May 15 09:18:27.816567 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 May 15 09:18:27.816578 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 15 09:18:27.816588 kernel: GPT:17805311 != 20971519 May 15 09:18:27.816598 kernel: GPT:Alternate GPT header not at the end of the disk. May 15 09:18:27.816608 kernel: GPT:17805311 != 20971519 May 15 09:18:27.816617 kernel: GPT: Use GNU Parted to correct GPT errors. May 15 09:18:27.816630 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 09:18:27.959581 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (445) May 15 09:18:27.979148 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 15 09:18:27.996399 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 09:18:28.011133 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 15 09:18:28.012506 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 15 09:18:28.023328 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 15 09:18:28.025545 systemd[1]: Starting disk-uuid.service... May 15 09:18:28.038585 disk-uuid[471]: Primary Header is updated. May 15 09:18:28.038585 disk-uuid[471]: Secondary Entries is updated. May 15 09:18:28.038585 disk-uuid[471]: Secondary Header is updated. May 15 09:18:28.049587 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 09:18:28.063612 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 09:18:29.076579 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 09:18:29.076997 disk-uuid[472]: The operation has completed successfully. May 15 09:18:29.147398 systemd[1]: disk-uuid.service: Deactivated successfully. May 15 09:18:29.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:29.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:29.147680 systemd[1]: Finished disk-uuid.service. May 15 09:18:29.164142 systemd[1]: Starting verity-setup.service... May 15 09:18:29.183584 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" May 15 09:18:29.297924 systemd[1]: Found device dev-mapper-usr.device. May 15 09:18:29.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:29.301403 systemd[1]: Mounting sysusr-usr.mount... May 15 09:18:29.303135 systemd[1]: Finished verity-setup.service. May 15 09:18:29.447560 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 15 09:18:29.447800 systemd[1]: Mounted sysusr-usr.mount. May 15 09:18:29.448933 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 15 09:18:29.451339 systemd[1]: Starting ignition-setup.service... May 15 09:18:29.454017 systemd[1]: Starting parse-ip-for-networkd.service... May 15 09:18:29.470814 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 09:18:29.470860 kernel: BTRFS info (device vda6): using free space tree May 15 09:18:29.470873 kernel: BTRFS info (device vda6): has skinny extents May 15 09:18:29.490602 systemd[1]: mnt-oem.mount: Deactivated successfully. May 15 09:18:29.509308 systemd[1]: Finished ignition-setup.service. May 15 09:18:29.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:29.510925 systemd[1]: Starting ignition-fetch-offline.service... May 15 09:18:29.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:29.600909 systemd[1]: Finished parse-ip-for-networkd.service. May 15 09:18:29.601000 audit: BPF prog-id=9 op=LOAD May 15 09:18:29.603096 systemd[1]: Starting systemd-networkd.service... May 15 09:18:29.634051 systemd-networkd[642]: lo: Link UP May 15 09:18:29.634752 systemd-networkd[642]: lo: Gained carrier May 15 09:18:29.635992 systemd-networkd[642]: Enumeration completed May 15 09:18:29.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:29.636646 systemd[1]: Started systemd-networkd.service. May 15 09:18:29.637293 systemd[1]: Reached target network.target. May 15 09:18:29.639181 systemd[1]: Starting iscsiuio.service... May 15 09:18:29.641536 systemd-networkd[642]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 09:18:29.644441 systemd-networkd[642]: eth0: Link UP May 15 09:18:29.644447 systemd-networkd[642]: eth0: Gained carrier May 15 09:18:29.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:29.645877 systemd[1]: Started iscsiuio.service. May 15 09:18:29.647495 systemd[1]: Starting iscsid.service... May 15 09:18:29.654982 iscsid[651]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 15 09:18:29.654982 iscsid[651]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 15 09:18:29.654982 iscsid[651]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 15 09:18:29.654982 iscsid[651]: If using hardware iscsi like qla4xxx this message can be ignored. May 15 09:18:29.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:29.661745 iscsid[651]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 15 09:18:29.661745 iscsid[651]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 15 09:18:29.660368 systemd[1]: Started iscsid.service. May 15 09:18:29.662102 systemd[1]: Starting dracut-initqueue.service... May 15 09:18:29.664628 systemd-networkd[642]: eth0: DHCPv4 address 172.24.4.133/24, gateway 172.24.4.1 acquired from 172.24.4.1 May 15 09:18:29.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:29.677094 systemd[1]: Finished dracut-initqueue.service. May 15 09:18:29.677750 systemd[1]: Reached target remote-fs-pre.target. May 15 09:18:29.678229 systemd[1]: Reached target remote-cryptsetup.target. May 15 09:18:29.678722 systemd[1]: Reached target remote-fs.target. May 15 09:18:29.679867 systemd[1]: Starting dracut-pre-mount.service... May 15 09:18:29.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:29.691000 systemd[1]: Finished dracut-pre-mount.service. May 15 09:18:29.808253 ignition[574]: Ignition 2.14.0 May 15 09:18:29.809926 ignition[574]: Stage: fetch-offline May 15 09:18:29.810042 ignition[574]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 09:18:29.810082 ignition[574]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 09:18:29.813839 ignition[574]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 09:18:29.814063 ignition[574]: parsed url from cmdline: "" May 15 09:18:29.816226 systemd[1]: Finished ignition-fetch-offline.service. May 15 09:18:29.814073 ignition[574]: no config URL provided May 15 09:18:29.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:29.819306 systemd[1]: Starting ignition-fetch.service... May 15 09:18:29.814086 ignition[574]: reading system config file "/usr/lib/ignition/user.ign" May 15 09:18:29.814105 ignition[574]: no config at "/usr/lib/ignition/user.ign" May 15 09:18:29.814125 ignition[574]: failed to fetch config: resource requires networking May 15 09:18:29.814370 ignition[574]: Ignition finished successfully May 15 09:18:29.848059 ignition[665]: Ignition 2.14.0 May 15 09:18:29.848084 ignition[665]: Stage: fetch May 15 09:18:29.848320 ignition[665]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 09:18:29.848362 ignition[665]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 09:18:29.850874 ignition[665]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 09:18:29.851086 ignition[665]: parsed url from cmdline: "" May 15 09:18:29.851096 ignition[665]: no config URL provided May 15 09:18:29.851108 ignition[665]: reading system config file "/usr/lib/ignition/user.ign" May 15 09:18:29.851127 ignition[665]: no config at "/usr/lib/ignition/user.ign" May 15 09:18:29.855867 ignition[665]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... May 15 09:18:29.855920 ignition[665]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... May 15 09:18:29.856655 ignition[665]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 May 15 09:18:30.111262 ignition[665]: GET result: OK May 15 09:18:30.111464 ignition[665]: parsing config with SHA512: 8550c727984b9ac79e1eb14aa74478f40ce4d6cd6d906a4b98045462e33907bd75531220da0ddd6a665de9ef13b3e310f6ef9393a04a73e72fb0f9026646425a May 15 09:18:30.131385 unknown[665]: fetched base config from "system" May 15 09:18:30.132991 unknown[665]: fetched base config from "system" May 15 09:18:30.134409 unknown[665]: fetched user config from "openstack" May 15 09:18:30.137040 ignition[665]: fetch: fetch complete May 15 09:18:30.138350 ignition[665]: fetch: fetch passed May 15 09:18:30.138791 ignition[665]: Ignition finished successfully May 15 09:18:30.141692 systemd[1]: Finished ignition-fetch.service. May 15 09:18:30.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:30.156366 systemd[1]: Starting ignition-kargs.service... May 15 09:18:30.177329 ignition[671]: Ignition 2.14.0 May 15 09:18:30.177355 ignition[671]: Stage: kargs May 15 09:18:30.177667 ignition[671]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 09:18:30.177709 ignition[671]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 09:18:30.179886 ignition[671]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 09:18:30.182445 ignition[671]: kargs: kargs passed May 15 09:18:30.182602 ignition[671]: Ignition finished successfully May 15 09:18:30.185110 systemd[1]: Finished ignition-kargs.service. May 15 09:18:30.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:30.189396 systemd[1]: Starting ignition-disks.service... May 15 09:18:30.206061 ignition[676]: Ignition 2.14.0 May 15 09:18:30.206086 ignition[676]: Stage: disks May 15 09:18:30.206322 ignition[676]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 09:18:30.206364 ignition[676]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 09:18:30.208589 ignition[676]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 09:18:30.211384 ignition[676]: disks: disks passed May 15 09:18:30.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:30.213281 systemd[1]: Finished ignition-disks.service. May 15 09:18:30.211481 ignition[676]: Ignition finished successfully May 15 09:18:30.214879 systemd[1]: Reached target initrd-root-device.target. May 15 09:18:30.217051 systemd[1]: Reached target local-fs-pre.target. May 15 09:18:30.219426 systemd[1]: Reached target local-fs.target. May 15 09:18:30.221820 systemd[1]: Reached target sysinit.target. May 15 09:18:30.224197 systemd[1]: Reached target basic.target. May 15 09:18:30.228268 systemd[1]: Starting systemd-fsck-root.service... May 15 09:18:30.260147 systemd-fsck[684]: ROOT: clean, 619/1628000 files, 124060/1617920 blocks May 15 09:18:30.273998 systemd[1]: Finished systemd-fsck-root.service. May 15 09:18:30.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:30.277263 systemd[1]: Mounting sysroot.mount... May 15 09:18:30.298597 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 15 09:18:30.300300 systemd[1]: Mounted sysroot.mount. May 15 09:18:30.301776 systemd[1]: Reached target initrd-root-fs.target. May 15 09:18:30.306635 systemd[1]: Mounting sysroot-usr.mount... May 15 09:18:30.308693 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 15 09:18:30.310323 systemd[1]: Starting flatcar-openstack-hostname.service... May 15 09:18:30.316135 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 15 09:18:30.316200 systemd[1]: Reached target ignition-diskful.target. May 15 09:18:30.324038 systemd[1]: Mounted sysroot-usr.mount. May 15 09:18:30.328980 systemd[1]: Starting initrd-setup-root.service... May 15 09:18:30.340832 initrd-setup-root[695]: cut: /sysroot/etc/passwd: No such file or directory May 15 09:18:30.349296 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 09:18:30.362429 initrd-setup-root[704]: cut: /sysroot/etc/group: No such file or directory May 15 09:18:30.370560 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (702) May 15 09:18:30.375083 initrd-setup-root[712]: cut: /sysroot/etc/shadow: No such file or directory May 15 09:18:30.377872 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 09:18:30.377891 kernel: BTRFS info (device vda6): using free space tree May 15 09:18:30.377903 kernel: BTRFS info (device vda6): has skinny extents May 15 09:18:30.382835 initrd-setup-root[736]: cut: /sysroot/etc/gshadow: No such file or directory May 15 09:18:30.389318 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 09:18:30.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:30.493596 systemd[1]: Finished initrd-setup-root.service. May 15 09:18:30.498024 systemd[1]: Starting ignition-mount.service... May 15 09:18:30.502037 systemd[1]: Starting sysroot-boot.service... May 15 09:18:30.523437 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 15 09:18:30.523712 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 15 09:18:30.546465 ignition[760]: INFO : Ignition 2.14.0 May 15 09:18:30.546465 ignition[760]: INFO : Stage: mount May 15 09:18:30.547716 ignition[760]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 09:18:30.547716 ignition[760]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 09:18:30.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:30.550828 ignition[760]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 09:18:30.550828 ignition[760]: INFO : mount: mount passed May 15 09:18:30.550828 ignition[760]: INFO : Ignition finished successfully May 15 09:18:30.549892 systemd[1]: Finished ignition-mount.service. May 15 09:18:30.560573 systemd[1]: Finished sysroot-boot.service. May 15 09:18:30.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:30.574414 coreos-metadata[690]: May 15 09:18:30.574 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 May 15 09:18:30.592299 coreos-metadata[690]: May 15 09:18:30.592 INFO Fetch successful May 15 09:18:30.593083 coreos-metadata[690]: May 15 09:18:30.593 INFO wrote hostname ci-3510-3-7-n-1f13e4db17.novalocal to /sysroot/etc/hostname May 15 09:18:30.597982 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. May 15 09:18:30.598138 systemd[1]: Finished flatcar-openstack-hostname.service. May 15 09:18:30.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:30.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:30.601150 systemd[1]: Starting ignition-files.service... May 15 09:18:30.611080 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 09:18:30.622567 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (768) May 15 09:18:30.630139 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 09:18:30.630190 kernel: BTRFS info (device vda6): using free space tree May 15 09:18:30.630203 kernel: BTRFS info (device vda6): has skinny extents May 15 09:18:30.643027 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 09:18:30.665693 ignition[787]: INFO : Ignition 2.14.0 May 15 09:18:30.665693 ignition[787]: INFO : Stage: files May 15 09:18:30.667826 ignition[787]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 09:18:30.667826 ignition[787]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 09:18:30.671166 ignition[787]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 09:18:30.673152 ignition[787]: DEBUG : files: compiled without relabeling support, skipping May 15 09:18:30.675037 ignition[787]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 15 09:18:30.675037 ignition[787]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 15 09:18:30.681442 ignition[787]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 15 09:18:30.683041 ignition[787]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 15 09:18:30.684554 ignition[787]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 15 09:18:30.684091 unknown[787]: wrote ssh authorized keys file for user: core May 15 09:18:30.690316 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 15 09:18:30.690316 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 15 09:18:30.766450 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 15 09:18:31.008314 systemd-networkd[642]: eth0: Gained IPv6LL May 15 09:18:31.080630 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 15 09:18:31.080630 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 15 09:18:31.086348 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 15 09:18:31.086348 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 15 09:18:31.086348 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 15 09:18:31.086348 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 09:18:31.086348 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 09:18:31.086348 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 09:18:31.086348 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 09:18:31.086348 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 15 09:18:31.086348 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 15 09:18:31.086348 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 15 09:18:31.086348 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 15 09:18:31.086348 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 15 09:18:31.086348 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 May 15 09:18:31.937022 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 15 09:18:34.515928 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 15 09:18:34.519094 ignition[787]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" May 15 09:18:34.519094 ignition[787]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" May 15 09:18:34.519094 ignition[787]: INFO : files: op(c): [started] processing unit "prepare-helm.service" May 15 09:18:34.519094 ignition[787]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 09:18:34.519094 ignition[787]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 09:18:34.519094 ignition[787]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" May 15 09:18:34.519094 ignition[787]: INFO : files: op(e): [started] setting preset to enabled for "prepare-helm.service" May 15 09:18:34.519094 ignition[787]: INFO : files: op(e): [finished] setting preset to enabled for "prepare-helm.service" May 15 09:18:34.519094 ignition[787]: INFO : files: op(f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 15 09:18:34.519094 ignition[787]: INFO : files: op(f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 15 09:18:34.553497 kernel: kauditd_printk_skb: 28 callbacks suppressed May 15 09:18:34.553520 kernel: audit: type=1130 audit(1747300714.531:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.528110 systemd[1]: Finished ignition-files.service. May 15 09:18:34.554232 ignition[787]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" May 15 09:18:34.554232 ignition[787]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" May 15 09:18:34.554232 ignition[787]: INFO : files: files passed May 15 09:18:34.554232 ignition[787]: INFO : Ignition finished successfully May 15 09:18:34.533342 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 15 09:18:34.552063 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 15 09:18:34.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.561248 initrd-setup-root-after-ignition[811]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 15 09:18:34.571959 kernel: audit: type=1130 audit(1747300714.560:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.571985 kernel: audit: type=1131 audit(1747300714.563:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.553726 systemd[1]: Starting ignition-quench.service... May 15 09:18:34.578739 kernel: audit: type=1130 audit(1747300714.572:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.560208 systemd[1]: ignition-quench.service: Deactivated successfully. May 15 09:18:34.560305 systemd[1]: Finished ignition-quench.service. May 15 09:18:34.564137 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 15 09:18:34.573394 systemd[1]: Reached target ignition-complete.target. May 15 09:18:34.581576 systemd[1]: Starting initrd-parse-etc.service... May 15 09:18:34.600162 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 15 09:18:34.601709 systemd[1]: Finished initrd-parse-etc.service. May 15 09:18:34.629457 kernel: audit: type=1130 audit(1747300714.601:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.629481 kernel: audit: type=1131 audit(1747300714.601:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.602467 systemd[1]: Reached target initrd-fs.target. May 15 09:18:34.626454 systemd[1]: Reached target initrd.target. May 15 09:18:34.626989 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 15 09:18:34.627911 systemd[1]: Starting dracut-pre-pivot.service... May 15 09:18:34.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.649575 kernel: audit: type=1130 audit(1747300714.643:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.643468 systemd[1]: Finished dracut-pre-pivot.service. May 15 09:18:34.644822 systemd[1]: Starting initrd-cleanup.service... May 15 09:18:34.658241 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 15 09:18:34.658335 systemd[1]: Finished initrd-cleanup.service. May 15 09:18:34.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.660242 systemd[1]: Stopped target nss-lookup.target. May 15 09:18:34.670053 kernel: audit: type=1130 audit(1747300714.658:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.670077 kernel: audit: type=1131 audit(1747300714.658:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.670655 systemd[1]: Stopped target remote-cryptsetup.target. May 15 09:18:34.671747 systemd[1]: Stopped target timers.target. May 15 09:18:34.672798 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 15 09:18:34.673444 systemd[1]: Stopped dracut-pre-pivot.service. May 15 09:18:34.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.674609 systemd[1]: Stopped target initrd.target. May 15 09:18:34.680196 kernel: audit: type=1131 audit(1747300714.673:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.679692 systemd[1]: Stopped target basic.target. May 15 09:18:34.680652 systemd[1]: Stopped target ignition-complete.target. May 15 09:18:34.681683 systemd[1]: Stopped target ignition-diskful.target. May 15 09:18:34.682666 systemd[1]: Stopped target initrd-root-device.target. May 15 09:18:34.683621 systemd[1]: Stopped target remote-fs.target. May 15 09:18:34.684581 systemd[1]: Stopped target remote-fs-pre.target. May 15 09:18:34.685559 systemd[1]: Stopped target sysinit.target. May 15 09:18:34.686474 systemd[1]: Stopped target local-fs.target. May 15 09:18:34.687416 systemd[1]: Stopped target local-fs-pre.target. May 15 09:18:34.688344 systemd[1]: Stopped target swap.target. May 15 09:18:34.689317 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 15 09:18:34.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.689377 systemd[1]: Stopped dracut-pre-mount.service. May 15 09:18:34.690310 systemd[1]: Stopped target cryptsetup.target. May 15 09:18:34.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.691331 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 15 09:18:34.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.691373 systemd[1]: Stopped dracut-initqueue.service. May 15 09:18:34.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.692413 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 15 09:18:34.692452 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 15 09:18:34.693406 systemd[1]: ignition-files.service: Deactivated successfully. May 15 09:18:34.693441 systemd[1]: Stopped ignition-files.service. May 15 09:18:34.695112 systemd[1]: Stopping ignition-mount.service... May 15 09:18:34.704576 ignition[825]: INFO : Ignition 2.14.0 May 15 09:18:34.704576 ignition[825]: INFO : Stage: umount May 15 09:18:34.704576 ignition[825]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 09:18:34.704576 ignition[825]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 09:18:34.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.712131 iscsid[651]: iscsid shutting down. May 15 09:18:34.701218 systemd[1]: Stopping iscsid.service... May 15 09:18:34.713218 ignition[825]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 09:18:34.713218 ignition[825]: INFO : umount: umount passed May 15 09:18:34.713218 ignition[825]: INFO : Ignition finished successfully May 15 09:18:34.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.704033 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 15 09:18:34.704093 systemd[1]: Stopped kmod-static-nodes.service. May 15 09:18:34.705767 systemd[1]: Stopping sysroot-boot.service... May 15 09:18:34.706561 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 15 09:18:34.706610 systemd[1]: Stopped systemd-udev-trigger.service. May 15 09:18:34.714186 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 15 09:18:34.714246 systemd[1]: Stopped dracut-pre-trigger.service. May 15 09:18:34.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.722720 systemd[1]: iscsid.service: Deactivated successfully. May 15 09:18:34.722807 systemd[1]: Stopped iscsid.service. May 15 09:18:34.723417 systemd[1]: ignition-mount.service: Deactivated successfully. May 15 09:18:34.723486 systemd[1]: Stopped ignition-mount.service. May 15 09:18:34.724017 systemd[1]: ignition-disks.service: Deactivated successfully. May 15 09:18:34.724059 systemd[1]: Stopped ignition-disks.service. May 15 09:18:34.724560 systemd[1]: ignition-kargs.service: Deactivated successfully. May 15 09:18:34.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.724597 systemd[1]: Stopped ignition-kargs.service. May 15 09:18:34.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.725098 systemd[1]: ignition-fetch.service: Deactivated successfully. May 15 09:18:34.725139 systemd[1]: Stopped ignition-fetch.service. May 15 09:18:34.725906 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 15 09:18:34.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.725945 systemd[1]: Stopped ignition-fetch-offline.service. May 15 09:18:34.726494 systemd[1]: Stopped target paths.target. May 15 09:18:34.727006 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 15 09:18:34.729748 systemd[1]: Stopped systemd-ask-password-console.path. May 15 09:18:34.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.730737 systemd[1]: Stopped target slices.target. May 15 09:18:34.731889 systemd[1]: Stopped target sockets.target. May 15 09:18:34.732643 systemd[1]: iscsid.socket: Deactivated successfully. May 15 09:18:34.732673 systemd[1]: Closed iscsid.socket. May 15 09:18:34.734062 systemd[1]: ignition-setup.service: Deactivated successfully. May 15 09:18:34.734099 systemd[1]: Stopped ignition-setup.service. May 15 09:18:34.734667 systemd[1]: Stopping iscsiuio.service... May 15 09:18:34.738864 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 15 09:18:34.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.739284 systemd[1]: iscsiuio.service: Deactivated successfully. May 15 09:18:34.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.739362 systemd[1]: Stopped iscsiuio.service. May 15 09:18:34.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.740168 systemd[1]: sysroot-boot.service: Deactivated successfully. May 15 09:18:34.740237 systemd[1]: Stopped sysroot-boot.service. May 15 09:18:34.741083 systemd[1]: Stopped target network.target. May 15 09:18:34.741901 systemd[1]: iscsiuio.socket: Deactivated successfully. May 15 09:18:34.741933 systemd[1]: Closed iscsiuio.socket. May 15 09:18:34.742806 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 15 09:18:34.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.742842 systemd[1]: Stopped initrd-setup-root.service. May 15 09:18:34.743875 systemd[1]: Stopping systemd-networkd.service... May 15 09:18:34.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.745177 systemd[1]: Stopping systemd-resolved.service... May 15 09:18:34.764000 audit: BPF prog-id=6 op=UNLOAD May 15 09:18:34.746614 systemd-networkd[642]: eth0: DHCPv6 lease lost May 15 09:18:34.765000 audit: BPF prog-id=9 op=UNLOAD May 15 09:18:34.747617 systemd[1]: systemd-networkd.service: Deactivated successfully. May 15 09:18:34.747701 systemd[1]: Stopped systemd-networkd.service. May 15 09:18:34.749625 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 15 09:18:34.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.749659 systemd[1]: Closed systemd-networkd.socket. May 15 09:18:34.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.753042 systemd[1]: Stopping network-cleanup.service... May 15 09:18:34.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.755133 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 15 09:18:34.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.755180 systemd[1]: Stopped parse-ip-for-networkd.service. May 15 09:18:34.756142 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 15 09:18:34.756179 systemd[1]: Stopped systemd-sysctl.service. May 15 09:18:34.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:34.757400 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 15 09:18:34.757439 systemd[1]: Stopped systemd-modules-load.service. May 15 09:18:34.758397 systemd[1]: Stopping systemd-udevd.service... May 15 09:18:34.760143 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 15 09:18:34.761272 systemd[1]: systemd-resolved.service: Deactivated successfully. May 15 09:18:34.761390 systemd[1]: Stopped systemd-resolved.service. May 15 09:18:34.763120 systemd[1]: systemd-udevd.service: Deactivated successfully. May 15 09:18:34.763229 systemd[1]: Stopped systemd-udevd.service. May 15 09:18:34.765027 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 15 09:18:34.765064 systemd[1]: Closed systemd-udevd-control.socket. May 15 09:18:34.767078 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 15 09:18:34.767108 systemd[1]: Closed systemd-udevd-kernel.socket. May 15 09:18:34.768098 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 15 09:18:34.768139 systemd[1]: Stopped dracut-pre-udev.service. May 15 09:18:34.769150 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 15 09:18:34.769188 systemd[1]: Stopped dracut-cmdline.service. May 15 09:18:34.770156 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 15 09:18:34.770197 systemd[1]: Stopped dracut-cmdline-ask.service. May 15 09:18:34.771743 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 15 09:18:34.773336 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 15 09:18:34.773402 systemd[1]: Stopped systemd-vconsole-setup.service. May 15 09:18:34.774231 systemd[1]: network-cleanup.service: Deactivated successfully. May 15 09:18:34.774321 systemd[1]: Stopped network-cleanup.service. May 15 09:18:34.776877 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 15 09:18:34.776960 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 15 09:18:34.777550 systemd[1]: Reached target initrd-switch-root.target. May 15 09:18:34.778795 systemd[1]: Starting initrd-switch-root.service... May 15 09:18:34.798336 systemd[1]: Switching root. May 15 09:18:34.818058 systemd-journald[185]: Journal stopped May 15 09:18:39.299892 systemd-journald[185]: Received SIGTERM from PID 1 (n/a). May 15 09:18:39.299958 kernel: SELinux: Class mctp_socket not defined in policy. May 15 09:18:39.299974 kernel: SELinux: Class anon_inode not defined in policy. May 15 09:18:39.299989 kernel: SELinux: the above unknown classes and permissions will be allowed May 15 09:18:39.300001 kernel: SELinux: policy capability network_peer_controls=1 May 15 09:18:39.300013 kernel: SELinux: policy capability open_perms=1 May 15 09:18:39.300026 kernel: SELinux: policy capability extended_socket_class=1 May 15 09:18:39.300037 kernel: SELinux: policy capability always_check_network=0 May 15 09:18:39.300051 kernel: SELinux: policy capability cgroup_seclabel=1 May 15 09:18:39.300062 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 15 09:18:39.300076 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 15 09:18:39.300090 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 15 09:18:39.300102 systemd[1]: Successfully loaded SELinux policy in 101.040ms. May 15 09:18:39.300117 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 21.636ms. May 15 09:18:39.300134 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 09:18:39.300152 systemd[1]: Detected virtualization kvm. May 15 09:18:39.300166 systemd[1]: Detected architecture x86-64. May 15 09:18:39.300179 systemd[1]: Detected first boot. May 15 09:18:39.300191 systemd[1]: Hostname set to . May 15 09:18:39.300204 systemd[1]: Initializing machine ID from VM UUID. May 15 09:18:39.300216 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 15 09:18:39.300229 systemd[1]: Populated /etc with preset unit settings. May 15 09:18:39.300242 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 09:18:39.300261 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 09:18:39.300275 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 09:18:39.300291 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 15 09:18:39.300304 systemd[1]: Stopped initrd-switch-root.service. May 15 09:18:39.300317 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 15 09:18:39.300330 systemd[1]: Created slice system-addon\x2dconfig.slice. May 15 09:18:39.300343 systemd[1]: Created slice system-addon\x2drun.slice. May 15 09:18:39.300358 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 15 09:18:39.300371 systemd[1]: Created slice system-getty.slice. May 15 09:18:39.300384 systemd[1]: Created slice system-modprobe.slice. May 15 09:18:39.300396 systemd[1]: Created slice system-serial\x2dgetty.slice. May 15 09:18:39.300409 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 15 09:18:39.300429 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 15 09:18:39.300441 systemd[1]: Created slice user.slice. May 15 09:18:39.300453 systemd[1]: Started systemd-ask-password-console.path. May 15 09:18:39.300465 systemd[1]: Started systemd-ask-password-wall.path. May 15 09:18:39.300480 systemd[1]: Set up automount boot.automount. May 15 09:18:39.300493 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 15 09:18:39.300505 systemd[1]: Stopped target initrd-switch-root.target. May 15 09:18:39.300517 systemd[1]: Stopped target initrd-fs.target. May 15 09:18:39.300671 systemd[1]: Stopped target initrd-root-fs.target. May 15 09:18:39.300701 systemd[1]: Reached target integritysetup.target. May 15 09:18:39.300716 systemd[1]: Reached target remote-cryptsetup.target. May 15 09:18:39.300728 systemd[1]: Reached target remote-fs.target. May 15 09:18:39.300740 systemd[1]: Reached target slices.target. May 15 09:18:39.300751 systemd[1]: Reached target swap.target. May 15 09:18:39.300763 systemd[1]: Reached target torcx.target. May 15 09:18:39.300774 systemd[1]: Reached target veritysetup.target. May 15 09:18:39.300787 systemd[1]: Listening on systemd-coredump.socket. May 15 09:18:39.300798 systemd[1]: Listening on systemd-initctl.socket. May 15 09:18:39.300811 systemd[1]: Listening on systemd-networkd.socket. May 15 09:18:39.300824 systemd[1]: Listening on systemd-udevd-control.socket. May 15 09:18:39.300838 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 09:18:39.300852 systemd[1]: Listening on systemd-userdbd.socket. May 15 09:18:39.300864 systemd[1]: Mounting dev-hugepages.mount... May 15 09:18:39.300877 systemd[1]: Mounting dev-mqueue.mount... May 15 09:18:39.300889 systemd[1]: Mounting media.mount... May 15 09:18:39.300901 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 09:18:39.300914 systemd[1]: Mounting sys-kernel-debug.mount... May 15 09:18:39.300928 systemd[1]: Mounting sys-kernel-tracing.mount... May 15 09:18:39.300940 systemd[1]: Mounting tmp.mount... May 15 09:18:39.300955 systemd[1]: Starting flatcar-tmpfiles.service... May 15 09:18:39.300968 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 09:18:39.300980 systemd[1]: Starting kmod-static-nodes.service... May 15 09:18:39.300992 systemd[1]: Starting modprobe@configfs.service... May 15 09:18:39.301005 systemd[1]: Starting modprobe@dm_mod.service... May 15 09:18:39.301017 systemd[1]: Starting modprobe@drm.service... May 15 09:18:39.301029 systemd[1]: Starting modprobe@efi_pstore.service... May 15 09:18:39.301041 systemd[1]: Starting modprobe@fuse.service... May 15 09:18:39.301053 systemd[1]: Starting modprobe@loop.service... May 15 09:18:39.301067 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 15 09:18:39.301080 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 15 09:18:39.301092 systemd[1]: Stopped systemd-fsck-root.service. May 15 09:18:39.301104 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 15 09:18:39.301117 systemd[1]: Stopped systemd-fsck-usr.service. May 15 09:18:39.301128 systemd[1]: Stopped systemd-journald.service. May 15 09:18:39.301141 systemd[1]: Starting systemd-journald.service... May 15 09:18:39.301153 systemd[1]: Starting systemd-modules-load.service... May 15 09:18:39.301165 systemd[1]: Starting systemd-network-generator.service... May 15 09:18:39.301179 systemd[1]: Starting systemd-remount-fs.service... May 15 09:18:39.301192 kernel: fuse: init (API version 7.34) May 15 09:18:39.301204 systemd[1]: Starting systemd-udev-trigger.service... May 15 09:18:39.301217 systemd[1]: verity-setup.service: Deactivated successfully. May 15 09:18:39.301229 systemd[1]: Stopped verity-setup.service. May 15 09:18:39.301241 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 09:18:39.301254 systemd[1]: Mounted dev-hugepages.mount. May 15 09:18:39.301269 systemd[1]: Mounted dev-mqueue.mount. May 15 09:18:39.301281 kernel: loop: module loaded May 15 09:18:39.301294 systemd[1]: Mounted media.mount. May 15 09:18:39.301307 systemd[1]: Mounted sys-kernel-debug.mount. May 15 09:18:39.301320 systemd[1]: Mounted sys-kernel-tracing.mount. May 15 09:18:39.301332 systemd[1]: Mounted tmp.mount. May 15 09:18:39.301346 systemd[1]: Finished kmod-static-nodes.service. May 15 09:18:39.301358 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 15 09:18:39.301370 systemd[1]: Finished modprobe@configfs.service. May 15 09:18:39.301383 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 09:18:39.301395 systemd[1]: Finished modprobe@dm_mod.service. May 15 09:18:39.301409 systemd[1]: Finished flatcar-tmpfiles.service. May 15 09:18:39.301421 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 09:18:39.301434 systemd[1]: Finished modprobe@drm.service. May 15 09:18:39.301449 systemd-journald[936]: Journal started May 15 09:18:39.301496 systemd-journald[936]: Runtime Journal (/run/log/journal/06d60d5f756149509b01b198ffdcb5ea) is 8.0M, max 78.4M, 70.4M free. May 15 09:18:35.108000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 09:18:35.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 09:18:35.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 09:18:35.252000 audit: BPF prog-id=10 op=LOAD May 15 09:18:35.252000 audit: BPF prog-id=10 op=UNLOAD May 15 09:18:35.252000 audit: BPF prog-id=11 op=LOAD May 15 09:18:35.252000 audit: BPF prog-id=11 op=UNLOAD May 15 09:18:35.420000 audit[858]: AVC avc: denied { associate } for pid=858 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 09:18:35.420000 audit[858]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d892 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=841 pid=858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:18:35.420000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 09:18:35.427000 audit[858]: AVC avc: denied { associate } for pid=858 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 09:18:35.427000 audit[858]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d969 a2=1ed a3=0 items=2 ppid=841 pid=858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:18:35.427000 audit: CWD cwd="/" May 15 09:18:35.427000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:35.427000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:35.427000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 09:18:39.046000 audit: BPF prog-id=12 op=LOAD May 15 09:18:39.046000 audit: BPF prog-id=3 op=UNLOAD May 15 09:18:39.046000 audit: BPF prog-id=13 op=LOAD May 15 09:18:39.046000 audit: BPF prog-id=14 op=LOAD May 15 09:18:39.046000 audit: BPF prog-id=4 op=UNLOAD May 15 09:18:39.046000 audit: BPF prog-id=5 op=UNLOAD May 15 09:18:39.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.057000 audit: BPF prog-id=12 op=UNLOAD May 15 09:18:39.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.225000 audit: BPF prog-id=15 op=LOAD May 15 09:18:39.225000 audit: BPF prog-id=16 op=LOAD May 15 09:18:39.226000 audit: BPF prog-id=17 op=LOAD May 15 09:18:39.226000 audit: BPF prog-id=13 op=UNLOAD May 15 09:18:39.226000 audit: BPF prog-id=14 op=UNLOAD May 15 09:18:39.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.306445 systemd[1]: Started systemd-journald.service. May 15 09:18:39.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.298000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 15 09:18:39.298000 audit[936]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffeebe85840 a2=4000 a3=7ffeebe858dc items=0 ppid=1 pid=936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:18:39.298000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 15 09:18:39.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:35.416613 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T09:18:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 09:18:39.044502 systemd[1]: Queued start job for default target multi-user.target. May 15 09:18:35.418217 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T09:18:35Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 09:18:39.044517 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 15 09:18:35.418244 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T09:18:35Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 09:18:39.047709 systemd[1]: systemd-journald.service: Deactivated successfully. May 15 09:18:35.418293 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T09:18:35Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 15 09:18:39.305470 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 09:18:35.418306 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T09:18:35Z" level=debug msg="skipped missing lower profile" missing profile=oem May 15 09:18:39.305614 systemd[1]: Finished modprobe@efi_pstore.service. May 15 09:18:35.418352 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T09:18:35Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 15 09:18:39.306321 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 15 09:18:35.418371 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T09:18:35Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 15 09:18:39.306701 systemd[1]: Finished modprobe@fuse.service. May 15 09:18:39.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:35.418689 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T09:18:35Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 15 09:18:39.309023 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 09:18:35.418741 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T09:18:35Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 09:18:39.309201 systemd[1]: Finished modprobe@loop.service. May 15 09:18:39.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:35.418759 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T09:18:35Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 09:18:39.309976 systemd[1]: Finished systemd-modules-load.service. May 15 09:18:35.419882 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T09:18:35Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 15 09:18:39.310775 systemd[1]: Finished systemd-network-generator.service. May 15 09:18:35.419928 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T09:18:35Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 15 09:18:39.311576 systemd[1]: Finished systemd-remount-fs.service. May 15 09:18:35.419953 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T09:18:35Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 15 09:18:39.312990 systemd[1]: Reached target network-pre.target. May 15 09:18:35.419973 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T09:18:35Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 15 09:18:35.419995 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T09:18:35Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 15 09:18:35.420013 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T09:18:35Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 15 09:18:38.607960 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T09:18:38Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 09:18:38.608229 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T09:18:38Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 09:18:38.608356 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T09:18:38Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 09:18:38.608576 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T09:18:38Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 09:18:38.608636 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T09:18:38Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 15 09:18:38.608724 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T09:18:38Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 15 09:18:39.316202 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 15 09:18:39.317853 systemd[1]: Mounting sys-kernel-config.mount... May 15 09:18:39.321296 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 15 09:18:39.323396 systemd[1]: Starting systemd-hwdb-update.service... May 15 09:18:39.325193 systemd[1]: Starting systemd-journal-flush.service... May 15 09:18:39.326282 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 09:18:39.327266 systemd[1]: Starting systemd-random-seed.service... May 15 09:18:39.328273 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 09:18:39.329768 systemd[1]: Starting systemd-sysctl.service... May 15 09:18:39.338888 systemd-journald[936]: Time spent on flushing to /var/log/journal/06d60d5f756149509b01b198ffdcb5ea is 28.670ms for 1093 entries. May 15 09:18:39.338888 systemd-journald[936]: System Journal (/var/log/journal/06d60d5f756149509b01b198ffdcb5ea) is 8.0M, max 584.8M, 576.8M free. May 15 09:18:39.386741 systemd-journald[936]: Received client request to flush runtime journal. May 15 09:18:39.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.332058 systemd[1]: Starting systemd-sysusers.service... May 15 09:18:39.336536 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 15 09:18:39.387264 udevadm[966]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 15 09:18:39.337465 systemd[1]: Mounted sys-kernel-config.mount. May 15 09:18:39.346165 systemd[1]: Finished systemd-random-seed.service. May 15 09:18:39.346863 systemd[1]: Reached target first-boot-complete.target. May 15 09:18:39.353826 systemd[1]: Finished systemd-udev-trigger.service. May 15 09:18:39.355498 systemd[1]: Starting systemd-udev-settle.service... May 15 09:18:39.373470 systemd[1]: Finished systemd-sysctl.service. May 15 09:18:39.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:39.388172 systemd[1]: Finished systemd-sysusers.service. May 15 09:18:39.388989 systemd[1]: Finished systemd-journal-flush.service. May 15 09:18:40.069720 systemd[1]: Finished systemd-hwdb-update.service. May 15 09:18:40.087133 kernel: kauditd_printk_skb: 94 callbacks suppressed May 15 09:18:40.087292 kernel: audit: type=1130 audit(1747300720.070:134): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:40.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:40.091430 kernel: audit: type=1334 audit(1747300720.086:135): prog-id=18 op=LOAD May 15 09:18:40.086000 audit: BPF prog-id=18 op=LOAD May 15 09:18:40.088415 systemd[1]: Starting systemd-udevd.service... May 15 09:18:40.086000 audit: BPF prog-id=19 op=LOAD May 15 09:18:40.100290 kernel: audit: type=1334 audit(1747300720.086:136): prog-id=19 op=LOAD May 15 09:18:40.100380 kernel: audit: type=1334 audit(1747300720.086:137): prog-id=7 op=UNLOAD May 15 09:18:40.086000 audit: BPF prog-id=7 op=UNLOAD May 15 09:18:40.086000 audit: BPF prog-id=8 op=UNLOAD May 15 09:18:40.106384 kernel: audit: type=1334 audit(1747300720.086:138): prog-id=8 op=UNLOAD May 15 09:18:40.126140 systemd-udevd[969]: Using default interface naming scheme 'v252'. May 15 09:18:40.164295 systemd[1]: Started systemd-udevd.service. May 15 09:18:40.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:40.190582 kernel: audit: type=1130 audit(1747300720.177:139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:40.199000 audit: BPF prog-id=20 op=LOAD May 15 09:18:40.205576 kernel: audit: type=1334 audit(1747300720.199:140): prog-id=20 op=LOAD May 15 09:18:40.208020 systemd[1]: Starting systemd-networkd.service... May 15 09:18:40.218000 audit: BPF prog-id=21 op=LOAD May 15 09:18:40.222000 audit: BPF prog-id=22 op=LOAD May 15 09:18:40.227616 kernel: audit: type=1334 audit(1747300720.218:141): prog-id=21 op=LOAD May 15 09:18:40.227672 kernel: audit: type=1334 audit(1747300720.222:142): prog-id=22 op=LOAD May 15 09:18:40.230115 systemd[1]: Starting systemd-userdbd.service... May 15 09:18:40.227000 audit: BPF prog-id=23 op=LOAD May 15 09:18:40.240561 kernel: audit: type=1334 audit(1747300720.227:143): prog-id=23 op=LOAD May 15 09:18:40.241160 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 15 09:18:40.285073 systemd[1]: Started systemd-userdbd.service. May 15 09:18:40.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:40.302373 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 09:18:40.313000 audit[972]: AVC avc: denied { confidentiality } for pid=972 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 15 09:18:40.313000 audit[972]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a465cbc3c0 a1=338ac a2=7f473a22fbc5 a3=5 items=110 ppid=969 pid=972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:18:40.313000 audit: CWD cwd="/" May 15 09:18:40.313000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=1 name=(null) inode=13247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=2 name=(null) inode=13247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=3 name=(null) inode=13248 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=4 name=(null) inode=13247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=5 name=(null) inode=13249 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=6 name=(null) inode=13247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=7 name=(null) inode=13250 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=8 name=(null) inode=13250 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=9 name=(null) inode=13251 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=10 name=(null) inode=13250 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=11 name=(null) inode=13252 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=12 name=(null) inode=13250 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=13 name=(null) inode=13253 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=14 name=(null) inode=13250 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=15 name=(null) inode=13254 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=16 name=(null) inode=13250 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=17 name=(null) inode=13255 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=18 name=(null) inode=13247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=19 name=(null) inode=13256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=20 name=(null) inode=13256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=21 name=(null) inode=13257 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=22 name=(null) inode=13256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=23 name=(null) inode=13258 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=24 name=(null) inode=13256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=25 name=(null) inode=13259 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=26 name=(null) inode=13256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=27 name=(null) inode=13260 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=28 name=(null) inode=13256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=29 name=(null) inode=13261 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=30 name=(null) inode=13247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=31 name=(null) inode=13262 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=32 name=(null) inode=13262 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=33 name=(null) inode=13263 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=34 name=(null) inode=13262 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=35 name=(null) inode=13264 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=36 name=(null) inode=13262 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=37 name=(null) inode=13265 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=38 name=(null) inode=13262 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=39 name=(null) inode=13266 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=40 name=(null) inode=13262 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=41 name=(null) inode=13267 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=42 name=(null) inode=13247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=43 name=(null) inode=13268 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=44 name=(null) inode=13268 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=45 name=(null) inode=13269 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=46 name=(null) inode=13268 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=47 name=(null) inode=13270 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=48 name=(null) inode=13268 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=49 name=(null) inode=13271 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=50 name=(null) inode=13268 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=51 name=(null) inode=13272 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=52 name=(null) inode=13268 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=53 name=(null) inode=13273 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=55 name=(null) inode=13274 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=56 name=(null) inode=13274 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=57 name=(null) inode=13275 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=58 name=(null) inode=13274 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=59 name=(null) inode=13276 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=60 name=(null) inode=13274 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=61 name=(null) inode=13277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=62 name=(null) inode=13277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=63 name=(null) inode=13278 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=64 name=(null) inode=13277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=65 name=(null) inode=13279 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=66 name=(null) inode=13277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=67 name=(null) inode=13280 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=68 name=(null) inode=13277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=69 name=(null) inode=13281 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=70 name=(null) inode=13277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=71 name=(null) inode=13282 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=72 name=(null) inode=13274 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=73 name=(null) inode=13283 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=74 name=(null) inode=13283 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=75 name=(null) inode=13284 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=76 name=(null) inode=13283 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=77 name=(null) inode=13285 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=78 name=(null) inode=13283 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=79 name=(null) inode=13286 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=80 name=(null) inode=13283 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=81 name=(null) inode=13287 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=82 name=(null) inode=13283 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=83 name=(null) inode=13288 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=84 name=(null) inode=13274 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=85 name=(null) inode=13289 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=86 name=(null) inode=13289 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=87 name=(null) inode=13290 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=88 name=(null) inode=13289 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=89 name=(null) inode=13291 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=90 name=(null) inode=13289 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=91 name=(null) inode=13292 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=92 name=(null) inode=13289 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=93 name=(null) inode=13293 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=94 name=(null) inode=13289 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=95 name=(null) inode=13294 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=96 name=(null) inode=13274 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=97 name=(null) inode=13295 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=98 name=(null) inode=13295 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=99 name=(null) inode=13296 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=100 name=(null) inode=13295 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=101 name=(null) inode=13297 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=102 name=(null) inode=13295 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=103 name=(null) inode=13298 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=104 name=(null) inode=13295 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=105 name=(null) inode=13299 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=106 name=(null) inode=13295 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=107 name=(null) inode=13300 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PATH item=109 name=(null) inode=13301 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:18:40.313000 audit: PROCTITLE proctitle="(udev-worker)" May 15 09:18:40.334560 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input2 May 15 09:18:40.371552 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 May 15 09:18:40.371625 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 May 15 09:18:40.379353 kernel: ACPI: button: Power Button [PWRF] May 15 09:18:40.384602 kernel: mousedev: PS/2 mouse device common for all mice May 15 09:18:40.408226 systemd-networkd[990]: lo: Link UP May 15 09:18:40.408236 systemd-networkd[990]: lo: Gained carrier May 15 09:18:40.408738 systemd-networkd[990]: Enumeration completed May 15 09:18:40.409366 systemd[1]: Started systemd-networkd.service. May 15 09:18:40.409382 systemd-networkd[990]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 09:18:40.411090 systemd-networkd[990]: eth0: Link UP May 15 09:18:40.411099 systemd-networkd[990]: eth0: Gained carrier May 15 09:18:40.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:40.445691 systemd-networkd[990]: eth0: DHCPv4 address 172.24.4.133/24, gateway 172.24.4.1 acquired from 172.24.4.1 May 15 09:18:40.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:40.450007 systemd[1]: Finished systemd-udev-settle.service. May 15 09:18:40.451511 systemd[1]: Starting lvm2-activation-early.service... May 15 09:18:40.485137 lvm[1003]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 09:18:40.517038 systemd[1]: Finished lvm2-activation-early.service. May 15 09:18:40.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:40.518492 systemd[1]: Reached target cryptsetup.target. May 15 09:18:40.522010 systemd[1]: Starting lvm2-activation.service... May 15 09:18:40.525975 lvm[1004]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 09:18:40.548469 systemd[1]: Finished lvm2-activation.service. May 15 09:18:40.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:40.549917 systemd[1]: Reached target local-fs-pre.target. May 15 09:18:40.551105 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 15 09:18:40.551169 systemd[1]: Reached target local-fs.target. May 15 09:18:40.552333 systemd[1]: Reached target machines.target. May 15 09:18:40.556040 systemd[1]: Starting ldconfig.service... May 15 09:18:40.559011 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 09:18:40.559110 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 09:18:40.561316 systemd[1]: Starting systemd-boot-update.service... May 15 09:18:40.565108 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 15 09:18:40.569438 systemd[1]: Starting systemd-machine-id-commit.service... May 15 09:18:40.572964 systemd[1]: Starting systemd-sysext.service... May 15 09:18:40.585034 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1006 (bootctl) May 15 09:18:40.587517 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 15 09:18:40.615187 systemd[1]: Unmounting usr-share-oem.mount... May 15 09:18:40.627667 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 15 09:18:40.627857 systemd[1]: Unmounted usr-share-oem.mount. May 15 09:18:40.664455 kernel: loop0: detected capacity change from 0 to 205544 May 15 09:18:40.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:40.663734 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 15 09:18:41.279586 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 15 09:18:41.280858 systemd[1]: Finished systemd-machine-id-commit.service. May 15 09:18:41.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.332594 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 15 09:18:41.357585 kernel: loop1: detected capacity change from 0 to 205544 May 15 09:18:41.379414 systemd-fsck[1017]: fsck.fat 4.2 (2021-01-31) May 15 09:18:41.379414 systemd-fsck[1017]: /dev/vda1: 790 files, 120690/258078 clusters May 15 09:18:41.386802 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 15 09:18:41.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.392283 systemd[1]: Mounting boot.mount... May 15 09:18:41.400999 (sd-sysext)[1020]: Using extensions 'kubernetes'. May 15 09:18:41.404217 (sd-sysext)[1020]: Merged extensions into '/usr'. May 15 09:18:41.423295 systemd[1]: Mounted boot.mount. May 15 09:18:41.438718 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 09:18:41.443170 systemd[1]: Mounting usr-share-oem.mount... May 15 09:18:41.445004 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 09:18:41.452504 systemd[1]: Starting modprobe@dm_mod.service... May 15 09:18:41.455478 systemd[1]: Starting modprobe@efi_pstore.service... May 15 09:18:41.458062 systemd[1]: Starting modprobe@loop.service... May 15 09:18:41.459733 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 09:18:41.459922 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 09:18:41.460058 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 09:18:41.463188 systemd[1]: Mounted usr-share-oem.mount. May 15 09:18:41.464079 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 09:18:41.464217 systemd[1]: Finished modprobe@dm_mod.service. May 15 09:18:41.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.465133 systemd[1]: Finished systemd-boot-update.service. May 15 09:18:41.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.466268 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 09:18:41.466583 systemd[1]: Finished modprobe@efi_pstore.service. May 15 09:18:41.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.467389 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 09:18:41.467506 systemd[1]: Finished modprobe@loop.service. May 15 09:18:41.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.468719 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 09:18:41.468805 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 09:18:41.470070 systemd[1]: Finished systemd-sysext.service. May 15 09:18:41.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.472140 systemd[1]: Starting ensure-sysext.service... May 15 09:18:41.475312 systemd[1]: Starting systemd-tmpfiles-setup.service... May 15 09:18:41.481567 systemd[1]: Reloading. May 15 09:18:41.499927 systemd-tmpfiles[1028]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 15 09:18:41.510796 systemd-tmpfiles[1028]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 15 09:18:41.529012 systemd-tmpfiles[1028]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 15 09:18:41.567746 systemd-networkd[990]: eth0: Gained IPv6LL May 15 09:18:41.575206 /usr/lib/systemd/system-generators/torcx-generator[1047]: time="2025-05-15T09:18:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 09:18:41.575238 /usr/lib/systemd/system-generators/torcx-generator[1047]: time="2025-05-15T09:18:41Z" level=info msg="torcx already run" May 15 09:18:41.724019 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 09:18:41.724199 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 09:18:41.757910 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 09:18:41.834000 audit: BPF prog-id=24 op=LOAD May 15 09:18:41.834000 audit: BPF prog-id=20 op=UNLOAD May 15 09:18:41.837000 audit: BPF prog-id=25 op=LOAD May 15 09:18:41.837000 audit: BPF prog-id=15 op=UNLOAD May 15 09:18:41.837000 audit: BPF prog-id=26 op=LOAD May 15 09:18:41.837000 audit: BPF prog-id=27 op=LOAD May 15 09:18:41.837000 audit: BPF prog-id=16 op=UNLOAD May 15 09:18:41.837000 audit: BPF prog-id=17 op=UNLOAD May 15 09:18:41.838000 audit: BPF prog-id=28 op=LOAD May 15 09:18:41.838000 audit: BPF prog-id=29 op=LOAD May 15 09:18:41.838000 audit: BPF prog-id=18 op=UNLOAD May 15 09:18:41.838000 audit: BPF prog-id=19 op=UNLOAD May 15 09:18:41.839000 audit: BPF prog-id=30 op=LOAD May 15 09:18:41.839000 audit: BPF prog-id=21 op=UNLOAD May 15 09:18:41.839000 audit: BPF prog-id=31 op=LOAD May 15 09:18:41.839000 audit: BPF prog-id=32 op=LOAD May 15 09:18:41.839000 audit: BPF prog-id=22 op=UNLOAD May 15 09:18:41.839000 audit: BPF prog-id=23 op=UNLOAD May 15 09:18:41.845362 systemd[1]: Finished systemd-tmpfiles-setup.service. May 15 09:18:41.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.850065 systemd[1]: Starting audit-rules.service... May 15 09:18:41.851588 systemd[1]: Starting clean-ca-certificates.service... May 15 09:18:41.853699 systemd[1]: Starting systemd-journal-catalog-update.service... May 15 09:18:41.855000 audit: BPF prog-id=33 op=LOAD May 15 09:18:41.859000 audit: BPF prog-id=34 op=LOAD May 15 09:18:41.858480 systemd[1]: Starting systemd-resolved.service... May 15 09:18:41.860831 systemd[1]: Starting systemd-timesyncd.service... May 15 09:18:41.863745 systemd[1]: Starting systemd-update-utmp.service... May 15 09:18:41.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.870770 systemd[1]: Finished clean-ca-certificates.service. May 15 09:18:41.871728 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 09:18:41.874449 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 09:18:41.874744 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 09:18:41.876760 systemd[1]: Starting modprobe@dm_mod.service... May 15 09:18:41.878818 systemd[1]: Starting modprobe@efi_pstore.service... May 15 09:18:41.881422 systemd[1]: Starting modprobe@loop.service... May 15 09:18:41.882078 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 09:18:41.882218 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 09:18:41.882354 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 09:18:41.882474 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 09:18:41.883000 audit[1101]: SYSTEM_BOOT pid=1101 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 15 09:18:41.885143 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 09:18:41.885310 systemd[1]: Finished modprobe@dm_mod.service. May 15 09:18:41.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.886486 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 09:18:41.886666 systemd[1]: Finished modprobe@efi_pstore.service. May 15 09:18:41.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.890852 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 09:18:41.892633 systemd[1]: Finished systemd-update-utmp.service. May 15 09:18:41.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.895374 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 09:18:41.895514 systemd[1]: Finished modprobe@loop.service. May 15 09:18:41.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.896816 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 09:18:41.899112 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 09:18:41.899366 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 09:18:41.902150 systemd[1]: Starting modprobe@dm_mod.service... May 15 09:18:41.904067 systemd[1]: Starting modprobe@efi_pstore.service... May 15 09:18:41.906420 systemd[1]: Starting modprobe@loop.service... May 15 09:18:41.907120 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 09:18:41.907272 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 09:18:41.907412 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 09:18:41.907644 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 09:18:41.909751 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 09:18:41.909916 systemd[1]: Finished modprobe@dm_mod.service. May 15 09:18:41.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.914928 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 09:18:41.915205 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 09:18:41.916496 systemd[1]: Starting modprobe@dm_mod.service... May 15 09:18:41.917340 ldconfig[1005]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 15 09:18:41.920383 systemd[1]: Starting modprobe@drm.service... May 15 09:18:41.921049 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 09:18:41.921289 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 09:18:41.922612 systemd[1]: Starting systemd-networkd-wait-online.service... May 15 09:18:41.923263 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 09:18:41.923404 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 09:18:41.924564 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 09:18:41.924747 systemd[1]: Finished modprobe@efi_pstore.service. May 15 09:18:41.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.926040 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 09:18:41.927236 systemd[1]: Finished ensure-sysext.service. May 15 09:18:41.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.929216 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 09:18:41.929336 systemd[1]: Finished modprobe@dm_mod.service. May 15 09:18:41.932966 systemd[1]: Finished ldconfig.service. May 15 09:18:41.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.933857 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 09:18:41.933979 systemd[1]: Finished modprobe@loop.service. May 15 09:18:41.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.934588 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 09:18:41.938876 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 09:18:41.939004 systemd[1]: Finished modprobe@drm.service. May 15 09:18:41.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.946682 systemd[1]: Finished systemd-networkd-wait-online.service. May 15 09:18:41.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.953466 systemd[1]: Finished systemd-journal-catalog-update.service. May 15 09:18:41.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.955251 systemd[1]: Starting systemd-update-done.service... May 15 09:18:41.965121 systemd[1]: Finished systemd-update-done.service. May 15 09:18:41.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:18:41.986000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 15 09:18:41.986000 audit[1126]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd8a105fe0 a2=420 a3=0 items=0 ppid=1095 pid=1126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:18:41.986000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 15 09:18:41.987218 augenrules[1126]: No rules May 15 09:18:41.987844 systemd[1]: Finished audit-rules.service. May 15 09:18:41.995683 systemd[1]: Started systemd-timesyncd.service. May 15 09:18:41.996233 systemd[1]: Reached target time-set.target. May 15 09:18:42.008571 systemd-resolved[1099]: Positive Trust Anchors: May 15 09:18:42.008914 systemd-resolved[1099]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 09:18:42.009013 systemd-resolved[1099]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 09:18:42.016497 systemd-resolved[1099]: Using system hostname 'ci-3510-3-7-n-1f13e4db17.novalocal'. May 15 09:18:42.018311 systemd[1]: Started systemd-resolved.service. May 15 09:18:42.018867 systemd[1]: Reached target network.target. May 15 09:18:42.019374 systemd[1]: Reached target network-online.target. May 15 09:18:42.019851 systemd[1]: Reached target nss-lookup.target. May 15 09:18:42.020278 systemd[1]: Reached target sysinit.target. May 15 09:18:42.020788 systemd[1]: Started motdgen.path. May 15 09:18:42.021249 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 15 09:18:42.021913 systemd[1]: Started logrotate.timer. May 15 09:18:42.022431 systemd[1]: Started mdadm.timer. May 15 09:18:42.022881 systemd[1]: Started systemd-tmpfiles-clean.timer. May 15 09:18:42.023350 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 15 09:18:42.023380 systemd[1]: Reached target paths.target. May 15 09:18:42.023832 systemd[1]: Reached target timers.target. May 15 09:18:42.024614 systemd[1]: Listening on dbus.socket. May 15 09:18:42.026108 systemd[1]: Starting docker.socket... May 15 09:18:42.029786 systemd[1]: Listening on sshd.socket. May 15 09:18:42.030558 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 09:18:42.030953 systemd[1]: Listening on docker.socket. May 15 09:18:42.031571 systemd[1]: Reached target sockets.target. May 15 09:18:42.032071 systemd[1]: Reached target basic.target. May 15 09:18:42.032607 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 09:18:42.032633 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 09:18:42.033667 systemd[1]: Starting containerd.service... May 15 09:18:42.035216 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 15 09:18:42.036801 systemd[1]: Starting dbus.service... May 15 09:18:42.038941 systemd[1]: Starting enable-oem-cloudinit.service... May 15 09:18:42.041349 systemd[1]: Starting extend-filesystems.service... May 15 09:18:42.041936 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 15 09:18:42.043931 systemd[1]: Starting kubelet.service... May 15 09:18:42.045825 systemd[1]: Starting motdgen.service... May 15 09:18:42.050878 systemd[1]: Starting prepare-helm.service... May 15 09:18:42.052464 systemd[1]: Starting ssh-key-proc-cmdline.service... May 15 09:18:42.054738 systemd[1]: Starting sshd-keygen.service... May 15 09:18:42.060747 systemd[1]: Starting systemd-logind.service... May 15 09:18:42.061335 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 09:18:42.061582 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 15 09:18:42.062227 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 15 09:18:42.063050 systemd[1]: Starting update-engine.service... May 15 09:18:42.066639 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 15 09:18:42.088566 jq[1139]: false May 15 09:18:42.088818 jq[1151]: true May 15 09:18:42.091010 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 15 09:18:42.091217 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 15 09:18:42.095562 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 15 09:18:42.095765 systemd[1]: Finished ssh-key-proc-cmdline.service. May 15 09:18:42.100179 tar[1155]: linux-amd64/helm May 15 09:18:42.110242 systemd-timesyncd[1100]: Contacted time server 131.153.171.250:123 (0.flatcar.pool.ntp.org). May 15 09:18:42.110382 systemd-timesyncd[1100]: Initial clock synchronization to Thu 2025-05-15 09:18:42.086877 UTC. May 15 09:18:42.122922 extend-filesystems[1140]: Found loop1 May 15 09:18:42.126484 extend-filesystems[1140]: Found vda May 15 09:18:42.126484 extend-filesystems[1140]: Found vda1 May 15 09:18:42.126484 extend-filesystems[1140]: Found vda2 May 15 09:18:42.126484 extend-filesystems[1140]: Found vda3 May 15 09:18:42.126484 extend-filesystems[1140]: Found usr May 15 09:18:42.126484 extend-filesystems[1140]: Found vda4 May 15 09:18:42.126484 extend-filesystems[1140]: Found vda6 May 15 09:18:42.126484 extend-filesystems[1140]: Found vda7 May 15 09:18:42.126484 extend-filesystems[1140]: Found vda9 May 15 09:18:42.126484 extend-filesystems[1140]: Checking size of /dev/vda9 May 15 09:18:42.158091 jq[1159]: true May 15 09:18:42.157799 systemd[1]: Started dbus.service. May 15 09:18:42.157654 dbus-daemon[1136]: [system] SELinux support is enabled May 15 09:18:42.160288 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 15 09:18:42.160313 systemd[1]: Reached target system-config.target. May 15 09:18:42.160856 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 15 09:18:42.160872 systemd[1]: Reached target user-config.target. May 15 09:18:42.167691 systemd[1]: motdgen.service: Deactivated successfully. May 15 09:18:42.167876 systemd[1]: Finished motdgen.service. May 15 09:18:42.171356 extend-filesystems[1140]: Resized partition /dev/vda9 May 15 09:18:42.177579 systemd[1]: Created slice system-sshd.slice. May 15 09:18:42.186723 extend-filesystems[1181]: resize2fs 1.46.5 (30-Dec-2021) May 15 09:18:42.226548 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 2014203 blocks May 15 09:18:42.239835 kernel: EXT4-fs (vda9): resized filesystem to 2014203 May 15 09:18:42.284707 update_engine[1149]: I0515 09:18:42.240051 1149 main.cc:92] Flatcar Update Engine starting May 15 09:18:42.284707 update_engine[1149]: I0515 09:18:42.250887 1149 update_check_scheduler.cc:74] Next update check in 7m29s May 15 09:18:42.250574 systemd[1]: Started update-engine.service. May 15 09:18:42.255246 systemd[1]: Started locksmithd.service. May 15 09:18:42.287621 extend-filesystems[1181]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 15 09:18:42.287621 extend-filesystems[1181]: old_desc_blocks = 1, new_desc_blocks = 1 May 15 09:18:42.287621 extend-filesystems[1181]: The filesystem on /dev/vda9 is now 2014203 (4k) blocks long. May 15 09:18:42.290173 extend-filesystems[1140]: Resized filesystem in /dev/vda9 May 15 09:18:42.291139 systemd[1]: extend-filesystems.service: Deactivated successfully. May 15 09:18:42.298975 env[1156]: time="2025-05-15T09:18:42.291627052Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 15 09:18:42.291303 systemd[1]: Finished extend-filesystems.service. May 15 09:18:42.292624 systemd-logind[1148]: Watching system buttons on /dev/input/event2 (Power Button) May 15 09:18:42.292644 systemd-logind[1148]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 15 09:18:42.292955 systemd-logind[1148]: New seat seat0. May 15 09:18:42.296406 systemd[1]: Started systemd-logind.service. May 15 09:18:42.316256 bash[1193]: Updated "/home/core/.ssh/authorized_keys" May 15 09:18:42.317200 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 15 09:18:42.357683 env[1156]: time="2025-05-15T09:18:42.357595366Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 15 09:18:42.364088 env[1156]: time="2025-05-15T09:18:42.364048118Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 15 09:18:42.365780 env[1156]: time="2025-05-15T09:18:42.365743337Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 15 09:18:42.365862 env[1156]: time="2025-05-15T09:18:42.365844687Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 15 09:18:42.366128 env[1156]: time="2025-05-15T09:18:42.366105426Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 09:18:42.366206 env[1156]: time="2025-05-15T09:18:42.366190666Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 15 09:18:42.366271 env[1156]: time="2025-05-15T09:18:42.366255157Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 15 09:18:42.366347 env[1156]: time="2025-05-15T09:18:42.366332262Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 15 09:18:42.366479 env[1156]: time="2025-05-15T09:18:42.366461594Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 15 09:18:42.366783 env[1156]: time="2025-05-15T09:18:42.366764903Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 15 09:18:42.366967 env[1156]: time="2025-05-15T09:18:42.366945191Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 09:18:42.367031 env[1156]: time="2025-05-15T09:18:42.367016826Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 15 09:18:42.367140 env[1156]: time="2025-05-15T09:18:42.367118907Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 15 09:18:42.367207 env[1156]: time="2025-05-15T09:18:42.367191974Z" level=info msg="metadata content store policy set" policy=shared May 15 09:18:42.469405 env[1156]: time="2025-05-15T09:18:42.467453234Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 15 09:18:42.469405 env[1156]: time="2025-05-15T09:18:42.467544275Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 15 09:18:42.469405 env[1156]: time="2025-05-15T09:18:42.467564623Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 15 09:18:42.469405 env[1156]: time="2025-05-15T09:18:42.467626309Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 15 09:18:42.469405 env[1156]: time="2025-05-15T09:18:42.467647759Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 15 09:18:42.469405 env[1156]: time="2025-05-15T09:18:42.467664500Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 15 09:18:42.469405 env[1156]: time="2025-05-15T09:18:42.467736195Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 15 09:18:42.469405 env[1156]: time="2025-05-15T09:18:42.467772363Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 15 09:18:42.469405 env[1156]: time="2025-05-15T09:18:42.467790076Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 15 09:18:42.469405 env[1156]: time="2025-05-15T09:18:42.467811546Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 15 09:18:42.469405 env[1156]: time="2025-05-15T09:18:42.467828027Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 15 09:18:42.469405 env[1156]: time="2025-05-15T09:18:42.467861460Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 15 09:18:42.469405 env[1156]: time="2025-05-15T09:18:42.468046497Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 15 09:18:42.469405 env[1156]: time="2025-05-15T09:18:42.468165039Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 15 09:18:42.469830 env[1156]: time="2025-05-15T09:18:42.468552696Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 15 09:18:42.469830 env[1156]: time="2025-05-15T09:18:42.468583694Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 15 09:18:42.469830 env[1156]: time="2025-05-15T09:18:42.468600336Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 15 09:18:42.469830 env[1156]: time="2025-05-15T09:18:42.468763201Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 15 09:18:42.469830 env[1156]: time="2025-05-15T09:18:42.468783690Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 15 09:18:42.469830 env[1156]: time="2025-05-15T09:18:42.468819507Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 15 09:18:42.469830 env[1156]: time="2025-05-15T09:18:42.468834876Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 15 09:18:42.469830 env[1156]: time="2025-05-15T09:18:42.468849874Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 15 09:18:42.469830 env[1156]: time="2025-05-15T09:18:42.468871164Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 15 09:18:42.469830 env[1156]: time="2025-05-15T09:18:42.468910688Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 15 09:18:42.469830 env[1156]: time="2025-05-15T09:18:42.468925375Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 15 09:18:42.469830 env[1156]: time="2025-05-15T09:18:42.468942287Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 15 09:18:42.469830 env[1156]: time="2025-05-15T09:18:42.469118387Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 15 09:18:42.469830 env[1156]: time="2025-05-15T09:18:42.469160536Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 15 09:18:42.469830 env[1156]: time="2025-05-15T09:18:42.469176156Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 15 09:18:42.470155 env[1156]: time="2025-05-15T09:18:42.469192095Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 15 09:18:42.470155 env[1156]: time="2025-05-15T09:18:42.469210550Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 15 09:18:42.470155 env[1156]: time="2025-05-15T09:18:42.469243833Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 15 09:18:42.470155 env[1156]: time="2025-05-15T09:18:42.469263149Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 15 09:18:42.470155 env[1156]: time="2025-05-15T09:18:42.469300459Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 15 09:18:42.471098 env[1156]: time="2025-05-15T09:18:42.470469491Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 15 09:18:42.471098 env[1156]: time="2025-05-15T09:18:42.470602461Z" level=info msg="Connect containerd service" May 15 09:18:42.471098 env[1156]: time="2025-05-15T09:18:42.470652394Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 15 09:18:42.500465 env[1156]: time="2025-05-15T09:18:42.471483303Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 09:18:42.500465 env[1156]: time="2025-05-15T09:18:42.471711320Z" level=info msg="Start subscribing containerd event" May 15 09:18:42.500465 env[1156]: time="2025-05-15T09:18:42.471748650Z" level=info msg="Start recovering state" May 15 09:18:42.500465 env[1156]: time="2025-05-15T09:18:42.471833379Z" level=info msg="Start event monitor" May 15 09:18:42.500465 env[1156]: time="2025-05-15T09:18:42.471881940Z" level=info msg="Start snapshots syncer" May 15 09:18:42.500465 env[1156]: time="2025-05-15T09:18:42.471896067Z" level=info msg="Start cni network conf syncer for default" May 15 09:18:42.500465 env[1156]: time="2025-05-15T09:18:42.471905214Z" level=info msg="Start streaming server" May 15 09:18:42.500465 env[1156]: time="2025-05-15T09:18:42.472155193Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 15 09:18:42.500465 env[1156]: time="2025-05-15T09:18:42.472261312Z" level=info msg=serving... address=/run/containerd/containerd.sock May 15 09:18:42.500465 env[1156]: time="2025-05-15T09:18:42.472362301Z" level=info msg="containerd successfully booted in 0.220014s" May 15 09:18:42.472459 systemd[1]: Started containerd.service. May 15 09:18:42.747445 tar[1155]: linux-amd64/LICENSE May 15 09:18:42.747596 tar[1155]: linux-amd64/README.md May 15 09:18:42.751815 systemd[1]: Finished prepare-helm.service. May 15 09:18:43.083379 locksmithd[1195]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 15 09:18:43.470978 sshd_keygen[1167]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 15 09:18:43.519400 systemd[1]: Finished sshd-keygen.service. May 15 09:18:43.521546 systemd[1]: Starting issuegen.service... May 15 09:18:43.523015 systemd[1]: Started sshd@0-172.24.4.133:22-172.24.4.1:40794.service. May 15 09:18:43.531365 systemd[1]: issuegen.service: Deactivated successfully. May 15 09:18:43.531541 systemd[1]: Finished issuegen.service. May 15 09:18:43.533673 systemd[1]: Starting systemd-user-sessions.service... May 15 09:18:43.543741 systemd[1]: Finished systemd-user-sessions.service. May 15 09:18:43.545937 systemd[1]: Started getty@tty1.service. May 15 09:18:43.547462 systemd[1]: Started serial-getty@ttyS0.service. May 15 09:18:43.548980 systemd[1]: Reached target getty.target. May 15 09:18:44.206475 systemd[1]: Started kubelet.service. May 15 09:18:44.847011 sshd[1216]: Accepted publickey for core from 172.24.4.1 port 40794 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:18:44.850777 sshd[1216]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:18:44.880849 systemd[1]: Created slice user-500.slice. May 15 09:18:44.885061 systemd[1]: Starting user-runtime-dir@500.service... May 15 09:18:44.894932 systemd-logind[1148]: New session 1 of user core. May 15 09:18:44.903935 systemd[1]: Finished user-runtime-dir@500.service. May 15 09:18:44.906315 systemd[1]: Starting user@500.service... May 15 09:18:44.912111 (systemd)[1232]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 15 09:18:45.054928 systemd[1232]: Queued start job for default target default.target. May 15 09:18:45.055717 systemd[1232]: Reached target paths.target. May 15 09:18:45.055741 systemd[1232]: Reached target sockets.target. May 15 09:18:45.055755 systemd[1232]: Reached target timers.target. May 15 09:18:45.055782 systemd[1232]: Reached target basic.target. May 15 09:18:45.055821 systemd[1232]: Reached target default.target. May 15 09:18:45.055848 systemd[1232]: Startup finished in 131ms. May 15 09:18:45.055985 systemd[1]: Started user@500.service. May 15 09:18:45.059618 systemd[1]: Started session-1.scope. May 15 09:18:45.439517 kubelet[1225]: E0515 09:18:45.439459 1225 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 09:18:45.441127 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 09:18:45.441259 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 09:18:45.441500 systemd[1]: kubelet.service: Consumed 1.616s CPU time. May 15 09:18:45.481906 systemd[1]: Started sshd@1-172.24.4.133:22-172.24.4.1:34730.service. May 15 09:18:47.096206 sshd[1242]: Accepted publickey for core from 172.24.4.1 port 34730 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:18:47.099447 sshd[1242]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:18:47.109622 systemd-logind[1148]: New session 2 of user core. May 15 09:18:47.110352 systemd[1]: Started session-2.scope. May 15 09:18:47.833266 systemd[1]: Started sshd@2-172.24.4.133:22-172.24.4.1:34736.service. May 15 09:18:48.494057 sshd[1242]: pam_unix(sshd:session): session closed for user core May 15 09:18:48.499885 systemd[1]: sshd@1-172.24.4.133:22-172.24.4.1:34730.service: Deactivated successfully. May 15 09:18:48.501474 systemd[1]: session-2.scope: Deactivated successfully. May 15 09:18:48.504124 systemd-logind[1148]: Session 2 logged out. Waiting for processes to exit. May 15 09:18:48.506074 systemd-logind[1148]: Removed session 2. May 15 09:18:49.168135 coreos-metadata[1135]: May 15 09:18:49.167 WARN failed to locate config-drive, using the metadata service API instead May 15 09:18:49.280350 coreos-metadata[1135]: May 15 09:18:49.280 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 May 15 09:18:49.321183 sshd[1247]: Accepted publickey for core from 172.24.4.1 port 34736 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:18:49.322932 sshd[1247]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:18:49.327855 systemd-logind[1148]: New session 3 of user core. May 15 09:18:49.329712 systemd[1]: Started session-3.scope. May 15 09:18:49.510495 coreos-metadata[1135]: May 15 09:18:49.510 INFO Fetch successful May 15 09:18:49.511180 coreos-metadata[1135]: May 15 09:18:49.510 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 May 15 09:18:49.525673 coreos-metadata[1135]: May 15 09:18:49.525 INFO Fetch successful May 15 09:18:49.530844 unknown[1135]: wrote ssh authorized keys file for user: core May 15 09:18:49.566991 update-ssh-keys[1253]: Updated "/home/core/.ssh/authorized_keys" May 15 09:18:49.568452 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 15 09:18:49.569316 systemd[1]: Reached target multi-user.target. May 15 09:18:49.572046 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 15 09:18:49.587636 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 15 09:18:49.588256 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 15 09:18:49.590066 systemd[1]: Startup finished in 1.001s (kernel) + 8.350s (initrd) + 14.608s (userspace) = 23.960s. May 15 09:18:50.064972 sshd[1247]: pam_unix(sshd:session): session closed for user core May 15 09:18:50.070331 systemd-logind[1148]: Session 3 logged out. Waiting for processes to exit. May 15 09:18:50.070666 systemd[1]: sshd@2-172.24.4.133:22-172.24.4.1:34736.service: Deactivated successfully. May 15 09:18:50.072039 systemd[1]: session-3.scope: Deactivated successfully. May 15 09:18:50.074077 systemd-logind[1148]: Removed session 3. May 15 09:18:55.692715 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 15 09:18:55.693145 systemd[1]: Stopped kubelet.service. May 15 09:18:55.693221 systemd[1]: kubelet.service: Consumed 1.616s CPU time. May 15 09:18:55.696709 systemd[1]: Starting kubelet.service... May 15 09:18:55.981390 systemd[1]: Started kubelet.service. May 15 09:18:56.161946 kubelet[1261]: E0515 09:18:56.161839 1261 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 09:18:56.168317 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 09:18:56.168650 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 09:19:00.067396 systemd[1]: Started sshd@3-172.24.4.133:22-172.24.4.1:52264.service. May 15 09:19:01.440459 sshd[1267]: Accepted publickey for core from 172.24.4.1 port 52264 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:19:01.443586 sshd[1267]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:19:01.453081 systemd-logind[1148]: New session 4 of user core. May 15 09:19:01.453829 systemd[1]: Started session-4.scope. May 15 09:19:02.054144 sshd[1267]: pam_unix(sshd:session): session closed for user core May 15 09:19:02.060515 systemd[1]: Started sshd@4-172.24.4.133:22-172.24.4.1:52274.service. May 15 09:19:02.065344 systemd[1]: sshd@3-172.24.4.133:22-172.24.4.1:52264.service: Deactivated successfully. May 15 09:19:02.066816 systemd[1]: session-4.scope: Deactivated successfully. May 15 09:19:02.069744 systemd-logind[1148]: Session 4 logged out. Waiting for processes to exit. May 15 09:19:02.072411 systemd-logind[1148]: Removed session 4. May 15 09:19:03.220407 sshd[1272]: Accepted publickey for core from 172.24.4.1 port 52274 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:19:03.223653 sshd[1272]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:19:03.233915 systemd[1]: Started session-5.scope. May 15 09:19:03.235209 systemd-logind[1148]: New session 5 of user core. May 15 09:19:03.863256 sshd[1272]: pam_unix(sshd:session): session closed for user core May 15 09:19:03.870113 systemd[1]: Started sshd@5-172.24.4.133:22-172.24.4.1:35618.service. May 15 09:19:03.872670 systemd[1]: sshd@4-172.24.4.133:22-172.24.4.1:52274.service: Deactivated successfully. May 15 09:19:03.874105 systemd[1]: session-5.scope: Deactivated successfully. May 15 09:19:03.877681 systemd-logind[1148]: Session 5 logged out. Waiting for processes to exit. May 15 09:19:03.880437 systemd-logind[1148]: Removed session 5. May 15 09:19:05.311897 sshd[1278]: Accepted publickey for core from 172.24.4.1 port 35618 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:19:05.314413 sshd[1278]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:19:05.324384 systemd-logind[1148]: New session 6 of user core. May 15 09:19:05.325196 systemd[1]: Started session-6.scope. May 15 09:19:05.953469 sshd[1278]: pam_unix(sshd:session): session closed for user core May 15 09:19:05.960865 systemd[1]: sshd@5-172.24.4.133:22-172.24.4.1:35618.service: Deactivated successfully. May 15 09:19:05.962154 systemd[1]: session-6.scope: Deactivated successfully. May 15 09:19:05.963678 systemd-logind[1148]: Session 6 logged out. Waiting for processes to exit. May 15 09:19:05.966054 systemd[1]: Started sshd@6-172.24.4.133:22-172.24.4.1:35622.service. May 15 09:19:05.969593 systemd-logind[1148]: Removed session 6. May 15 09:19:06.420299 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 15 09:19:06.421436 systemd[1]: Stopped kubelet.service. May 15 09:19:06.424257 systemd[1]: Starting kubelet.service... May 15 09:19:06.717350 systemd[1]: Started kubelet.service. May 15 09:19:06.781280 kubelet[1291]: E0515 09:19:06.781178 1291 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 09:19:06.783932 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 09:19:06.784223 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 09:19:07.369704 sshd[1285]: Accepted publickey for core from 172.24.4.1 port 35622 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:19:07.372277 sshd[1285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:19:07.381644 systemd-logind[1148]: New session 7 of user core. May 15 09:19:07.383672 systemd[1]: Started session-7.scope. May 15 09:19:07.842641 sudo[1298]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 15 09:19:07.843156 sudo[1298]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 09:19:07.854808 dbus-daemon[1136]: н\xb7\x9e\xd1U: received setenforce notice (enforcing=546062112) May 15 09:19:07.858805 sudo[1298]: pam_unix(sudo:session): session closed for user root May 15 09:19:08.084283 sshd[1285]: pam_unix(sshd:session): session closed for user core May 15 09:19:08.091321 systemd[1]: Started sshd@7-172.24.4.133:22-172.24.4.1:35636.service. May 15 09:19:08.097367 systemd[1]: sshd@6-172.24.4.133:22-172.24.4.1:35622.service: Deactivated successfully. May 15 09:19:08.098937 systemd[1]: session-7.scope: Deactivated successfully. May 15 09:19:08.101991 systemd-logind[1148]: Session 7 logged out. Waiting for processes to exit. May 15 09:19:08.105032 systemd-logind[1148]: Removed session 7. May 15 09:19:09.515698 sshd[1301]: Accepted publickey for core from 172.24.4.1 port 35636 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:19:09.519021 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:19:09.528471 systemd-logind[1148]: New session 8 of user core. May 15 09:19:09.529157 systemd[1]: Started session-8.scope. May 15 09:19:09.990456 sudo[1306]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 15 09:19:09.990999 sudo[1306]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 09:19:09.997398 sudo[1306]: pam_unix(sudo:session): session closed for user root May 15 09:19:10.007279 sudo[1305]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 15 09:19:10.008375 sudo[1305]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 09:19:10.028811 systemd[1]: Stopping audit-rules.service... May 15 09:19:10.029000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 09:19:10.042635 kernel: kauditd_printk_skb: 178 callbacks suppressed May 15 09:19:10.042788 kernel: audit: type=1305 audit(1747300750.029:207): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 09:19:10.042850 kernel: audit: type=1300 audit(1747300750.029:207): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff80e245c0 a2=420 a3=0 items=0 ppid=1 pid=1309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:10.029000 audit[1309]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff80e245c0 a2=420 a3=0 items=0 ppid=1 pid=1309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:10.064666 kernel: audit: type=1327 audit(1747300750.029:207): proctitle=2F7362696E2F617564697463746C002D44 May 15 09:19:10.029000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 15 09:19:10.064889 auditctl[1309]: No rules May 15 09:19:10.065312 systemd[1]: audit-rules.service: Deactivated successfully. May 15 09:19:10.065725 systemd[1]: Stopped audit-rules.service. May 15 09:19:10.080885 kernel: audit: type=1131 audit(1747300750.064:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:10.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:10.082592 systemd[1]: Starting audit-rules.service... May 15 09:19:10.108530 augenrules[1326]: No rules May 15 09:19:10.109473 systemd[1]: Finished audit-rules.service. May 15 09:19:10.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:10.111255 sudo[1305]: pam_unix(sudo:session): session closed for user root May 15 09:19:10.109000 audit[1305]: USER_END pid=1305 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 09:19:10.121917 kernel: audit: type=1130 audit(1747300750.108:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:10.122028 kernel: audit: type=1106 audit(1747300750.109:210): pid=1305 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 09:19:10.122085 kernel: audit: type=1104 audit(1747300750.109:211): pid=1305 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 09:19:10.109000 audit[1305]: CRED_DISP pid=1305 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 09:19:10.260331 sshd[1301]: pam_unix(sshd:session): session closed for user core May 15 09:19:10.264000 audit[1301]: USER_END pid=1301 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:19:10.266406 systemd[1]: Started sshd@8-172.24.4.133:22-172.24.4.1:35644.service. May 15 09:19:10.286582 kernel: audit: type=1106 audit(1747300750.264:212): pid=1301 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:19:10.275152 systemd[1]: sshd@7-172.24.4.133:22-172.24.4.1:35636.service: Deactivated successfully. May 15 09:19:10.276659 systemd[1]: session-8.scope: Deactivated successfully. May 15 09:19:10.265000 audit[1301]: CRED_DISP pid=1301 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:19:10.304903 systemd-logind[1148]: Session 8 logged out. Waiting for processes to exit. May 15 09:19:10.306676 kernel: audit: type=1104 audit(1747300750.265:213): pid=1301 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:19:10.306774 kernel: audit: type=1130 audit(1747300750.265:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.133:22-172.24.4.1:35644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:10.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.133:22-172.24.4.1:35644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:10.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.133:22-172.24.4.1:35636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:10.319638 systemd-logind[1148]: Removed session 8. May 15 09:19:11.632000 audit[1331]: USER_ACCT pid=1331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:19:11.634849 sshd[1331]: Accepted publickey for core from 172.24.4.1 port 35644 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:19:11.634000 audit[1331]: CRED_ACQ pid=1331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:19:11.635000 audit[1331]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7bd7d6d0 a2=3 a3=0 items=0 ppid=1 pid=1331 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:11.635000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 09:19:11.636281 sshd[1331]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:19:11.644423 systemd-logind[1148]: New session 9 of user core. May 15 09:19:11.646492 systemd[1]: Started session-9.scope. May 15 09:19:11.658000 audit[1331]: USER_START pid=1331 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:19:11.660000 audit[1334]: CRED_ACQ pid=1334 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:19:12.106000 audit[1335]: USER_ACCT pid=1335 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 09:19:12.106000 audit[1335]: CRED_REFR pid=1335 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 09:19:12.107044 sudo[1335]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 15 09:19:12.108343 sudo[1335]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 09:19:12.111000 audit[1335]: USER_START pid=1335 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 09:19:12.165031 systemd[1]: Starting docker.service... May 15 09:19:12.251091 env[1345]: time="2025-05-15T09:19:12.251041694Z" level=info msg="Starting up" May 15 09:19:12.253786 env[1345]: time="2025-05-15T09:19:12.253747784Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 09:19:12.253935 env[1345]: time="2025-05-15T09:19:12.253903892Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 09:19:12.254099 env[1345]: time="2025-05-15T09:19:12.254059569Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 09:19:12.254241 env[1345]: time="2025-05-15T09:19:12.254210668Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 09:19:12.257146 env[1345]: time="2025-05-15T09:19:12.257099330Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 09:19:12.257146 env[1345]: time="2025-05-15T09:19:12.257119244Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 09:19:12.257146 env[1345]: time="2025-05-15T09:19:12.257134169Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 09:19:12.257146 env[1345]: time="2025-05-15T09:19:12.257144114Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 09:19:12.267440 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3053431818-merged.mount: Deactivated successfully. May 15 09:19:12.310259 env[1345]: time="2025-05-15T09:19:12.310184118Z" level=info msg="Loading containers: start." May 15 09:19:12.416000 audit[1375]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1375 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:12.416000 audit[1375]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff7ba92280 a2=0 a3=7fff7ba9226c items=0 ppid=1345 pid=1375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:12.416000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 15 09:19:12.418000 audit[1377]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1377 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:12.418000 audit[1377]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff888a0a20 a2=0 a3=7fff888a0a0c items=0 ppid=1345 pid=1377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:12.418000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 15 09:19:12.421000 audit[1379]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1379 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:12.421000 audit[1379]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffbc8b98d0 a2=0 a3=7fffbc8b98bc items=0 ppid=1345 pid=1379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:12.421000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 09:19:12.425000 audit[1381]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1381 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:12.425000 audit[1381]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe28b34c00 a2=0 a3=7ffe28b34bec items=0 ppid=1345 pid=1381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:12.425000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 09:19:12.431000 audit[1383]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1383 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:12.431000 audit[1383]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc48495e60 a2=0 a3=7ffc48495e4c items=0 ppid=1345 pid=1383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:12.431000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 15 09:19:12.448000 audit[1388]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:12.448000 audit[1388]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdc0c1a000 a2=0 a3=7ffdc0c19fec items=0 ppid=1345 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:12.448000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 15 09:19:12.467000 audit[1390]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1390 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:12.467000 audit[1390]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffef9e4b700 a2=0 a3=7ffef9e4b6ec items=0 ppid=1345 pid=1390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:12.467000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 15 09:19:12.471000 audit[1392]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1392 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:12.471000 audit[1392]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc14066ea0 a2=0 a3=7ffc14066e8c items=0 ppid=1345 pid=1392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:12.471000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 15 09:19:12.475000 audit[1394]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1394 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:12.475000 audit[1394]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fffab161310 a2=0 a3=7fffab1612fc items=0 ppid=1345 pid=1394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:12.475000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 09:19:12.494000 audit[1398]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1398 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:12.494000 audit[1398]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc8a881290 a2=0 a3=7ffc8a88127c items=0 ppid=1345 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:12.494000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 09:19:12.500000 audit[1399]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:12.500000 audit[1399]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc849ebce0 a2=0 a3=7ffc849ebccc items=0 ppid=1345 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:12.500000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 09:19:12.532583 kernel: Initializing XFRM netlink socket May 15 09:19:12.627265 env[1345]: time="2025-05-15T09:19:12.627192637Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 15 09:19:12.659000 audit[1407]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:12.659000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffec7fd8f10 a2=0 a3=7ffec7fd8efc items=0 ppid=1345 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:12.659000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 15 09:19:12.688000 audit[1410]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:12.688000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc10662380 a2=0 a3=7ffc1066236c items=0 ppid=1345 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:12.688000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 15 09:19:12.694000 audit[1413]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:12.694000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffca811add0 a2=0 a3=7ffca811adbc items=0 ppid=1345 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:12.694000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 15 09:19:12.698000 audit[1415]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:12.698000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffca817b20 a2=0 a3=7fffca817b0c items=0 ppid=1345 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:12.698000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 15 09:19:12.702000 audit[1417]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:12.702000 audit[1417]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff7c3b5ae0 a2=0 a3=7fff7c3b5acc items=0 ppid=1345 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:12.702000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 15 09:19:12.706000 audit[1419]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:12.706000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe91c5b550 a2=0 a3=7ffe91c5b53c items=0 ppid=1345 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:12.706000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 15 09:19:12.710000 audit[1421]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:12.710000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff3672f580 a2=0 a3=7fff3672f56c items=0 ppid=1345 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:12.710000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 15 09:19:12.730000 audit[1424]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:12.730000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff5822e160 a2=0 a3=7fff5822e14c items=0 ppid=1345 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:12.730000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 15 09:19:12.735000 audit[1426]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:12.735000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffeb90f2390 a2=0 a3=7ffeb90f237c items=0 ppid=1345 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:12.735000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 09:19:12.739000 audit[1428]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:12.739000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd8611b5f0 a2=0 a3=7ffd8611b5dc items=0 ppid=1345 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:12.739000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 09:19:12.743000 audit[1430]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:12.743000 audit[1430]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd80139610 a2=0 a3=7ffd801395fc items=0 ppid=1345 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:12.743000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 15 09:19:12.744986 systemd-networkd[990]: docker0: Link UP May 15 09:19:12.765000 audit[1434]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:12.765000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd0e40f5c0 a2=0 a3=7ffd0e40f5ac items=0 ppid=1345 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:12.765000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 09:19:12.771000 audit[1435]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:12.771000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff8634b5c0 a2=0 a3=7fff8634b5ac items=0 ppid=1345 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:12.771000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 09:19:12.773015 env[1345]: time="2025-05-15T09:19:12.772961271Z" level=info msg="Loading containers: done." May 15 09:19:12.806520 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck533012842-merged.mount: Deactivated successfully. May 15 09:19:12.822783 env[1345]: time="2025-05-15T09:19:12.822682081Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 15 09:19:12.823773 env[1345]: time="2025-05-15T09:19:12.823704991Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 15 09:19:12.824387 env[1345]: time="2025-05-15T09:19:12.824311613Z" level=info msg="Daemon has completed initialization" May 15 09:19:12.909356 systemd[1]: Started docker.service. May 15 09:19:12.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:12.927659 env[1345]: time="2025-05-15T09:19:12.927521428Z" level=info msg="API listen on /run/docker.sock" May 15 09:19:14.739185 env[1156]: time="2025-05-15T09:19:14.739046113Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\"" May 15 09:19:15.524237 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1642559397.mount: Deactivated successfully. May 15 09:19:16.837040 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 15 09:19:16.837863 systemd[1]: Stopped kubelet.service. May 15 09:19:16.853766 kernel: kauditd_printk_skb: 84 callbacks suppressed May 15 09:19:16.854369 kernel: audit: type=1130 audit(1747300756.837:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:16.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:16.840556 systemd[1]: Starting kubelet.service... May 15 09:19:16.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:16.869571 kernel: audit: type=1131 audit(1747300756.837:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:16.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:16.937063 systemd[1]: Started kubelet.service. May 15 09:19:16.942610 kernel: audit: type=1130 audit(1747300756.936:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:17.270606 kubelet[1473]: E0515 09:19:17.270457 1473 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 09:19:17.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 09:19:17.272637 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 09:19:17.272772 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 09:19:17.278570 kernel: audit: type=1131 audit(1747300757.272:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 09:19:18.016895 env[1156]: time="2025-05-15T09:19:18.016801556Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:18.020602 env[1156]: time="2025-05-15T09:19:18.020512963Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:18.029040 env[1156]: time="2025-05-15T09:19:18.028981491Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:18.035161 env[1156]: time="2025-05-15T09:19:18.035104346Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:30090db6a7d53799163ce82dae9e8ddb645fd47db93f2ec9da0cc787fd825625,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:18.037321 env[1156]: time="2025-05-15T09:19:18.037259221Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\" returns image reference \"sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc\"" May 15 09:19:18.041025 env[1156]: time="2025-05-15T09:19:18.040957686Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\"" May 15 09:19:20.531385 env[1156]: time="2025-05-15T09:19:20.531266042Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:20.536151 env[1156]: time="2025-05-15T09:19:20.536060334Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:20.540232 env[1156]: time="2025-05-15T09:19:20.540178699Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:20.546902 env[1156]: time="2025-05-15T09:19:20.546836117Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:29eaddc64792a689df48506e78bbc641d063ac8bb92d2e66ae2ad05977420747,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:20.551911 env[1156]: time="2025-05-15T09:19:20.549642286Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\" returns image reference \"sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f\"" May 15 09:19:20.553044 env[1156]: time="2025-05-15T09:19:20.552919696Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\"" May 15 09:19:22.563731 env[1156]: time="2025-05-15T09:19:22.563684906Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:22.570771 env[1156]: time="2025-05-15T09:19:22.570716088Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:22.574062 env[1156]: time="2025-05-15T09:19:22.574028142Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:22.576825 env[1156]: time="2025-05-15T09:19:22.576800176Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:22994a2632e81059720480b9f6bdeb133b08d58492d0b36dfd6e9768b159b22a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:22.578080 env[1156]: time="2025-05-15T09:19:22.578036549Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\" returns image reference \"sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8\"" May 15 09:19:22.578708 env[1156]: time="2025-05-15T09:19:22.578682035Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" May 15 09:19:24.187071 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount821705473.mount: Deactivated successfully. May 15 09:19:25.541601 env[1156]: time="2025-05-15T09:19:25.541489170Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:25.547207 env[1156]: time="2025-05-15T09:19:25.547154128Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:25.551941 env[1156]: time="2025-05-15T09:19:25.551893328Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:25.556361 env[1156]: time="2025-05-15T09:19:25.556311748Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:dd0c9a37670f209947b1ed880f06a2e93e1d41da78c037f52f94b13858769838,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:25.559273 env[1156]: time="2025-05-15T09:19:25.558018755Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" returns image reference \"sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2\"" May 15 09:19:25.562005 env[1156]: time="2025-05-15T09:19:25.561918252Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 15 09:19:26.202300 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount782744897.mount: Deactivated successfully. May 15 09:19:27.324985 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 15 09:19:27.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:27.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:27.325459 systemd[1]: Stopped kubelet.service. May 15 09:19:27.328674 systemd[1]: Starting kubelet.service... May 15 09:19:27.335793 kernel: audit: type=1130 audit(1747300767.324:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:27.335904 kernel: audit: type=1131 audit(1747300767.325:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:27.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:27.463609 systemd[1]: Started kubelet.service. May 15 09:19:27.469569 kernel: audit: type=1130 audit(1747300767.463:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:27.518494 kubelet[1484]: E0515 09:19:27.518443 1484 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 09:19:27.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 09:19:27.519737 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 09:19:27.519864 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 09:19:27.525547 kernel: audit: type=1131 audit(1747300767.519:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 09:19:27.645415 update_engine[1149]: I0515 09:19:27.645303 1149 update_attempter.cc:509] Updating boot flags... May 15 09:19:28.073277 env[1156]: time="2025-05-15T09:19:28.073069119Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:28.076435 env[1156]: time="2025-05-15T09:19:28.076380897Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:28.082745 env[1156]: time="2025-05-15T09:19:28.082682654Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:28.086007 env[1156]: time="2025-05-15T09:19:28.085948709Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:28.086959 env[1156]: time="2025-05-15T09:19:28.086905829Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 15 09:19:28.087925 env[1156]: time="2025-05-15T09:19:28.087876722Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 15 09:19:28.660581 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1382532111.mount: Deactivated successfully. May 15 09:19:28.673334 env[1156]: time="2025-05-15T09:19:28.673267739Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:28.678637 env[1156]: time="2025-05-15T09:19:28.678585489Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:28.681771 env[1156]: time="2025-05-15T09:19:28.681723555Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:28.685031 env[1156]: time="2025-05-15T09:19:28.684978641Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:28.686797 env[1156]: time="2025-05-15T09:19:28.686684093Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 15 09:19:28.689272 env[1156]: time="2025-05-15T09:19:28.689197588Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" May 15 09:19:29.381036 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2746550931.mount: Deactivated successfully. May 15 09:19:34.367018 env[1156]: time="2025-05-15T09:19:34.366955535Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:34.371229 env[1156]: time="2025-05-15T09:19:34.371174480Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:34.380087 env[1156]: time="2025-05-15T09:19:34.380051610Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:34.386563 env[1156]: time="2025-05-15T09:19:34.384812301Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:34.387127 env[1156]: time="2025-05-15T09:19:34.387076215Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" May 15 09:19:37.574004 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. May 15 09:19:37.574234 systemd[1]: Stopped kubelet.service. May 15 09:19:37.575587 systemd[1]: Starting kubelet.service... May 15 09:19:37.582440 kernel: audit: type=1130 audit(1747300777.573:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:37.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:37.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:37.598594 kernel: audit: type=1131 audit(1747300777.573:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:37.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:37.905719 systemd[1]: Started kubelet.service. May 15 09:19:37.911573 kernel: audit: type=1130 audit(1747300777.905:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:38.022895 kubelet[1525]: E0515 09:19:38.022859 1525 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 09:19:38.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 09:19:38.024498 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 09:19:38.024648 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 09:19:38.030575 kernel: audit: type=1131 audit(1747300778.024:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 09:19:38.851047 systemd[1]: Stopped kubelet.service. May 15 09:19:38.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:38.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:38.864875 systemd[1]: Starting kubelet.service... May 15 09:19:38.876061 kernel: audit: type=1130 audit(1747300778.851:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:38.876119 kernel: audit: type=1131 audit(1747300778.854:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:38.918301 systemd[1]: Reloading. May 15 09:19:39.036793 /usr/lib/systemd/system-generators/torcx-generator[1557]: time="2025-05-15T09:19:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 09:19:39.037594 /usr/lib/systemd/system-generators/torcx-generator[1557]: time="2025-05-15T09:19:39Z" level=info msg="torcx already run" May 15 09:19:39.280785 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 09:19:39.280806 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 09:19:39.305704 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 09:19:39.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.400285 kernel: audit: type=1400 audit(1747300779.389:263): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.400444 kernel: audit: type=1400 audit(1747300779.389:264): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.400679 kernel: audit: type=1400 audit(1747300779.389:265): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.405268 kernel: audit: type=1400 audit(1747300779.389:266): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.404000 audit: BPF prog-id=40 op=LOAD May 15 09:19:39.404000 audit: BPF prog-id=33 op=UNLOAD May 15 09:19:39.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.411000 audit: BPF prog-id=41 op=LOAD May 15 09:19:39.411000 audit: BPF prog-id=24 op=UNLOAD May 15 09:19:39.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.417000 audit: BPF prog-id=42 op=LOAD May 15 09:19:39.417000 audit: BPF prog-id=34 op=UNLOAD May 15 09:19:39.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.419000 audit: BPF prog-id=43 op=LOAD May 15 09:19:39.419000 audit: BPF prog-id=25 op=UNLOAD May 15 09:19:39.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.420000 audit: BPF prog-id=44 op=LOAD May 15 09:19:39.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.420000 audit: BPF prog-id=45 op=LOAD May 15 09:19:39.420000 audit: BPF prog-id=26 op=UNLOAD May 15 09:19:39.420000 audit: BPF prog-id=27 op=UNLOAD May 15 09:19:39.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.421000 audit: BPF prog-id=46 op=LOAD May 15 09:19:39.421000 audit: BPF prog-id=38 op=UNLOAD May 15 09:19:39.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.426000 audit: BPF prog-id=47 op=LOAD May 15 09:19:39.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.427000 audit: BPF prog-id=48 op=LOAD May 15 09:19:39.427000 audit: BPF prog-id=28 op=UNLOAD May 15 09:19:39.427000 audit: BPF prog-id=29 op=UNLOAD May 15 09:19:39.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.429000 audit: BPF prog-id=49 op=LOAD May 15 09:19:39.429000 audit: BPF prog-id=35 op=UNLOAD May 15 09:19:39.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.430000 audit: BPF prog-id=50 op=LOAD May 15 09:19:39.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.430000 audit: BPF prog-id=51 op=LOAD May 15 09:19:39.430000 audit: BPF prog-id=36 op=UNLOAD May 15 09:19:39.430000 audit: BPF prog-id=37 op=UNLOAD May 15 09:19:39.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.432000 audit: BPF prog-id=52 op=LOAD May 15 09:19:39.432000 audit: BPF prog-id=30 op=UNLOAD May 15 09:19:39.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.433000 audit: BPF prog-id=53 op=LOAD May 15 09:19:39.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:39.433000 audit: BPF prog-id=54 op=LOAD May 15 09:19:39.433000 audit: BPF prog-id=31 op=UNLOAD May 15 09:19:39.433000 audit: BPF prog-id=32 op=UNLOAD May 15 09:19:39.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:39.461968 systemd[1]: Started kubelet.service. May 15 09:19:39.471129 systemd[1]: Stopping kubelet.service... May 15 09:19:39.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:39.472839 systemd[1]: kubelet.service: Deactivated successfully. May 15 09:19:39.473016 systemd[1]: Stopped kubelet.service. May 15 09:19:39.474743 systemd[1]: Starting kubelet.service... May 15 09:19:39.565986 systemd[1]: Started kubelet.service. May 15 09:19:39.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:39.619982 kubelet[1615]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 09:19:39.619982 kubelet[1615]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 09:19:39.619982 kubelet[1615]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 09:19:39.888277 kubelet[1615]: I0515 09:19:39.888162 1615 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 09:19:40.412195 kubelet[1615]: I0515 09:19:40.412136 1615 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 15 09:19:40.412480 kubelet[1615]: I0515 09:19:40.412453 1615 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 09:19:40.413277 kubelet[1615]: I0515 09:19:40.413243 1615 server.go:929] "Client rotation is on, will bootstrap in background" May 15 09:19:40.473630 kubelet[1615]: E0515 09:19:40.473572 1615 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://172.24.4.133:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 172.24.4.133:6443: connect: connection refused" logger="UnhandledError" May 15 09:19:40.475327 kubelet[1615]: I0515 09:19:40.475286 1615 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 09:19:40.505782 kubelet[1615]: E0515 09:19:40.505686 1615 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 15 09:19:40.506091 kubelet[1615]: I0515 09:19:40.506059 1615 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 15 09:19:40.516047 kubelet[1615]: I0515 09:19:40.516008 1615 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 09:19:40.516403 kubelet[1615]: I0515 09:19:40.516374 1615 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 15 09:19:40.516913 kubelet[1615]: I0515 09:19:40.516861 1615 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 09:19:40.517485 kubelet[1615]: I0515 09:19:40.517079 1615 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-7-n-1f13e4db17.novalocal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 15 09:19:40.517885 kubelet[1615]: I0515 09:19:40.517855 1615 topology_manager.go:138] "Creating topology manager with none policy" May 15 09:19:40.518032 kubelet[1615]: I0515 09:19:40.518011 1615 container_manager_linux.go:300] "Creating device plugin manager" May 15 09:19:40.518384 kubelet[1615]: I0515 09:19:40.518355 1615 state_mem.go:36] "Initialized new in-memory state store" May 15 09:19:40.529446 kubelet[1615]: I0515 09:19:40.529368 1615 kubelet.go:408] "Attempting to sync node with API server" May 15 09:19:40.529689 kubelet[1615]: I0515 09:19:40.529662 1615 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 09:19:40.537878 kubelet[1615]: W0515 09:19:40.537802 1615 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.24.4.133:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-n-1f13e4db17.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.133:6443: connect: connection refused May 15 09:19:40.537878 kubelet[1615]: E0515 09:19:40.537851 1615 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.24.4.133:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-n-1f13e4db17.novalocal&limit=500&resourceVersion=0\": dial tcp 172.24.4.133:6443: connect: connection refused" logger="UnhandledError" May 15 09:19:40.539102 kubelet[1615]: I0515 09:19:40.539069 1615 kubelet.go:314] "Adding apiserver pod source" May 15 09:19:40.539313 kubelet[1615]: I0515 09:19:40.539286 1615 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 09:19:40.564374 kubelet[1615]: I0515 09:19:40.564329 1615 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 09:19:40.566887 kubelet[1615]: W0515 09:19:40.566797 1615 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.24.4.133:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.24.4.133:6443: connect: connection refused May 15 09:19:40.567185 kubelet[1615]: E0515 09:19:40.567095 1615 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.24.4.133:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.24.4.133:6443: connect: connection refused" logger="UnhandledError" May 15 09:19:40.568623 kubelet[1615]: I0515 09:19:40.568580 1615 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 09:19:40.568771 kubelet[1615]: W0515 09:19:40.568672 1615 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 15 09:19:40.569398 kubelet[1615]: I0515 09:19:40.569364 1615 server.go:1269] "Started kubelet" May 15 09:19:40.570039 kubelet[1615]: I0515 09:19:40.569985 1615 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 09:19:40.572584 kubelet[1615]: I0515 09:19:40.572508 1615 server.go:460] "Adding debug handlers to kubelet server" May 15 09:19:40.574121 kubelet[1615]: I0515 09:19:40.574040 1615 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 09:19:40.575123 kubelet[1615]: I0515 09:19:40.575088 1615 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 09:19:40.575926 kubelet[1615]: E0515 09:19:40.574305 1615 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.24.4.133:6443/api/v1/namespaces/default/events\": dial tcp 172.24.4.133:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-7-n-1f13e4db17.novalocal.183fa8cd6599216b default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-7-n-1f13e4db17.novalocal,UID:ci-3510-3-7-n-1f13e4db17.novalocal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-7-n-1f13e4db17.novalocal,},FirstTimestamp:2025-05-15 09:19:40.569338219 +0000 UTC m=+0.997288305,LastTimestamp:2025-05-15 09:19:40.569338219 +0000 UTC m=+0.997288305,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-7-n-1f13e4db17.novalocal,}" May 15 09:19:40.576000 audit[1615]: AVC avc: denied { mac_admin } for pid=1615 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:40.576000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 09:19:40.576000 audit[1615]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009f3a10 a1=c000935230 a2=c0009f39e0 a3=25 items=0 ppid=1 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:40.576000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 09:19:40.576000 audit[1615]: AVC avc: denied { mac_admin } for pid=1615 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:40.576000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 09:19:40.576000 audit[1615]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b501c0 a1=c000935248 a2=c0009f3aa0 a3=25 items=0 ppid=1 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:40.576000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 09:19:40.578007 kubelet[1615]: I0515 09:19:40.576963 1615 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 09:19:40.578007 kubelet[1615]: I0515 09:19:40.577014 1615 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 09:19:40.578007 kubelet[1615]: I0515 09:19:40.577072 1615 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 09:19:40.578000 audit[1625]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1625 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:40.578000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcd7c54c00 a2=0 a3=7ffcd7c54bec items=0 ppid=1615 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:40.578000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 09:19:40.579000 audit[1626]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1626 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:40.579000 audit[1626]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc0313fb0 a2=0 a3=7fffc0313f9c items=0 ppid=1615 pid=1626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:40.579000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 09:19:40.582705 kubelet[1615]: I0515 09:19:40.581425 1615 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 15 09:19:40.582871 kubelet[1615]: I0515 09:19:40.582803 1615 volume_manager.go:289] "Starting Kubelet Volume Manager" May 15 09:19:40.583029 kubelet[1615]: E0515 09:19:40.582995 1615 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510-3-7-n-1f13e4db17.novalocal\" not found" May 15 09:19:40.585510 kubelet[1615]: I0515 09:19:40.585471 1615 factory.go:221] Registration of the systemd container factory successfully May 15 09:19:40.584000 audit[1628]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1628 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:40.584000 audit[1628]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffb678f090 a2=0 a3=7fffb678f07c items=0 ppid=1615 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:40.584000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 09:19:40.586212 kubelet[1615]: I0515 09:19:40.586171 1615 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 09:19:40.587244 kubelet[1615]: I0515 09:19:40.587199 1615 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 15 09:19:40.587402 kubelet[1615]: I0515 09:19:40.587288 1615 reconciler.go:26] "Reconciler: start to sync state" May 15 09:19:40.587000 audit[1630]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1630 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:40.587000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcf3412c30 a2=0 a3=7ffcf3412c1c items=0 ppid=1615 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:40.587000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 09:19:40.589029 kubelet[1615]: E0515 09:19:40.588972 1615 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.133:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-n-1f13e4db17.novalocal?timeout=10s\": dial tcp 172.24.4.133:6443: connect: connection refused" interval="200ms" May 15 09:19:40.591276 kubelet[1615]: I0515 09:19:40.591240 1615 factory.go:221] Registration of the containerd container factory successfully May 15 09:19:40.596000 audit[1633]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1633 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:40.596000 audit[1633]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd561acaa0 a2=0 a3=7ffd561aca8c items=0 ppid=1615 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:40.596000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 15 09:19:40.597000 audit[1634]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1634 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:40.597000 audit[1634]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffec33876c0 a2=0 a3=7ffec33876ac items=0 ppid=1615 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:40.597000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 09:19:40.599000 audit[1635]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1635 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:40.599000 audit[1635]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb48e6950 a2=0 a3=7fffb48e693c items=0 ppid=1615 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:40.599000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 09:19:40.599000 audit[1636]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1636 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:40.599000 audit[1636]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3ef95840 a2=0 a3=7ffc3ef9582c items=0 ppid=1615 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:40.599000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 09:19:40.600000 audit[1638]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1638 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:40.600000 audit[1638]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5d6b64c0 a2=0 a3=7fff5d6b64ac items=0 ppid=1615 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:40.600000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 09:19:40.601000 audit[1639]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1639 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:40.601000 audit[1639]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe65c2cdb0 a2=0 a3=7ffe65c2cd9c items=0 ppid=1615 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:40.601000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 09:19:40.602739 kubelet[1615]: I0515 09:19:40.597560 1615 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 09:19:40.602739 kubelet[1615]: I0515 09:19:40.598504 1615 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 09:19:40.602739 kubelet[1615]: I0515 09:19:40.598543 1615 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 09:19:40.602739 kubelet[1615]: I0515 09:19:40.598575 1615 kubelet.go:2321] "Starting kubelet main sync loop" May 15 09:19:40.602739 kubelet[1615]: E0515 09:19:40.598626 1615 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 09:19:40.602000 audit[1640]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1640 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:40.602000 audit[1640]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc4c2e8710 a2=0 a3=7ffc4c2e86fc items=0 ppid=1615 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:40.602000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 09:19:40.603000 audit[1641]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1641 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:40.603000 audit[1641]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff9cb8b780 a2=0 a3=7fff9cb8b76c items=0 ppid=1615 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:40.603000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 09:19:40.604791 kubelet[1615]: W0515 09:19:40.604727 1615 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.24.4.133:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.133:6443: connect: connection refused May 15 09:19:40.604791 kubelet[1615]: E0515 09:19:40.604784 1615 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.24.4.133:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.24.4.133:6443: connect: connection refused" logger="UnhandledError" May 15 09:19:40.604946 kubelet[1615]: W0515 09:19:40.604845 1615 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.24.4.133:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.133:6443: connect: connection refused May 15 09:19:40.604946 kubelet[1615]: E0515 09:19:40.604879 1615 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.24.4.133:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.24.4.133:6443: connect: connection refused" logger="UnhandledError" May 15 09:19:40.633163 kubelet[1615]: I0515 09:19:40.633128 1615 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 09:19:40.633163 kubelet[1615]: I0515 09:19:40.633149 1615 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 09:19:40.633163 kubelet[1615]: I0515 09:19:40.633169 1615 state_mem.go:36] "Initialized new in-memory state store" May 15 09:19:40.640067 kubelet[1615]: I0515 09:19:40.640034 1615 policy_none.go:49] "None policy: Start" May 15 09:19:40.640721 kubelet[1615]: I0515 09:19:40.640627 1615 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 09:19:40.640783 kubelet[1615]: I0515 09:19:40.640741 1615 state_mem.go:35] "Initializing new in-memory state store" May 15 09:19:40.649083 systemd[1]: Created slice kubepods.slice. May 15 09:19:40.656001 systemd[1]: Created slice kubepods-burstable.slice. May 15 09:19:40.661223 systemd[1]: Created slice kubepods-besteffort.slice. May 15 09:19:40.671990 kubelet[1615]: I0515 09:19:40.667415 1615 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 09:19:40.671000 audit[1615]: AVC avc: denied { mac_admin } for pid=1615 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:40.671000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 09:19:40.671000 audit[1615]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cf6f60 a1=c000859218 a2=c000cf6f30 a3=25 items=0 ppid=1 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:40.671000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 09:19:40.672468 kubelet[1615]: I0515 09:19:40.672445 1615 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 09:19:40.672732 kubelet[1615]: I0515 09:19:40.672709 1615 eviction_manager.go:189] "Eviction manager: starting control loop" May 15 09:19:40.672845 kubelet[1615]: I0515 09:19:40.672806 1615 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 09:19:40.673397 kubelet[1615]: I0515 09:19:40.673384 1615 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 09:19:40.675574 kubelet[1615]: E0515 09:19:40.675557 1615 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-7-n-1f13e4db17.novalocal\" not found" May 15 09:19:40.715669 systemd[1]: Created slice kubepods-burstable-pod215a3b5d5db3833873b336f37903bd31.slice. May 15 09:19:40.728429 systemd[1]: Created slice kubepods-burstable-podd9974dc4032c929f418e2b68dee23dc1.slice. May 15 09:19:40.741375 systemd[1]: Created slice kubepods-burstable-pod927acfbd23b1a64ba46eef94ed6898ad.slice. May 15 09:19:40.776882 kubelet[1615]: I0515 09:19:40.776804 1615 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:40.777595 kubelet[1615]: E0515 09:19:40.777549 1615 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.24.4.133:6443/api/v1/nodes\": dial tcp 172.24.4.133:6443: connect: connection refused" node="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:40.788883 kubelet[1615]: I0515 09:19:40.788621 1615 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/215a3b5d5db3833873b336f37903bd31-kubeconfig\") pod \"kube-scheduler-ci-3510-3-7-n-1f13e4db17.novalocal\" (UID: \"215a3b5d5db3833873b336f37903bd31\") " pod="kube-system/kube-scheduler-ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:40.789032 kubelet[1615]: I0515 09:19:40.788930 1615 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d9974dc4032c929f418e2b68dee23dc1-ca-certs\") pod \"kube-apiserver-ci-3510-3-7-n-1f13e4db17.novalocal\" (UID: \"d9974dc4032c929f418e2b68dee23dc1\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:40.789179 kubelet[1615]: I0515 09:19:40.789108 1615 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d9974dc4032c929f418e2b68dee23dc1-k8s-certs\") pod \"kube-apiserver-ci-3510-3-7-n-1f13e4db17.novalocal\" (UID: \"d9974dc4032c929f418e2b68dee23dc1\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:40.789912 kubelet[1615]: I0515 09:19:40.789821 1615 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/927acfbd23b1a64ba46eef94ed6898ad-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal\" (UID: \"927acfbd23b1a64ba46eef94ed6898ad\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:40.790000 kubelet[1615]: I0515 09:19:40.789973 1615 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d9974dc4032c929f418e2b68dee23dc1-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-7-n-1f13e4db17.novalocal\" (UID: \"d9974dc4032c929f418e2b68dee23dc1\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:40.790079 kubelet[1615]: E0515 09:19:40.789861 1615 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.133:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-n-1f13e4db17.novalocal?timeout=10s\": dial tcp 172.24.4.133:6443: connect: connection refused" interval="400ms" May 15 09:19:40.790185 kubelet[1615]: I0515 09:19:40.790028 1615 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/927acfbd23b1a64ba46eef94ed6898ad-ca-certs\") pod \"kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal\" (UID: \"927acfbd23b1a64ba46eef94ed6898ad\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:40.790442 kubelet[1615]: I0515 09:19:40.790360 1615 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/927acfbd23b1a64ba46eef94ed6898ad-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal\" (UID: \"927acfbd23b1a64ba46eef94ed6898ad\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:40.790648 kubelet[1615]: I0515 09:19:40.790618 1615 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/927acfbd23b1a64ba46eef94ed6898ad-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal\" (UID: \"927acfbd23b1a64ba46eef94ed6898ad\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:40.790847 kubelet[1615]: I0515 09:19:40.790818 1615 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/927acfbd23b1a64ba46eef94ed6898ad-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal\" (UID: \"927acfbd23b1a64ba46eef94ed6898ad\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:40.983583 kubelet[1615]: I0515 09:19:40.981898 1615 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:40.983583 kubelet[1615]: E0515 09:19:40.983381 1615 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.24.4.133:6443/api/v1/nodes\": dial tcp 172.24.4.133:6443: connect: connection refused" node="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:41.030067 env[1156]: time="2025-05-15T09:19:41.028984777Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-7-n-1f13e4db17.novalocal,Uid:215a3b5d5db3833873b336f37903bd31,Namespace:kube-system,Attempt:0,}" May 15 09:19:41.038867 env[1156]: time="2025-05-15T09:19:41.038782907Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-7-n-1f13e4db17.novalocal,Uid:d9974dc4032c929f418e2b68dee23dc1,Namespace:kube-system,Attempt:0,}" May 15 09:19:41.046426 env[1156]: time="2025-05-15T09:19:41.046307412Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal,Uid:927acfbd23b1a64ba46eef94ed6898ad,Namespace:kube-system,Attempt:0,}" May 15 09:19:41.191343 kubelet[1615]: E0515 09:19:41.191235 1615 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.133:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-n-1f13e4db17.novalocal?timeout=10s\": dial tcp 172.24.4.133:6443: connect: connection refused" interval="800ms" May 15 09:19:41.386857 kubelet[1615]: I0515 09:19:41.386802 1615 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:41.387497 kubelet[1615]: E0515 09:19:41.387303 1615 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.24.4.133:6443/api/v1/nodes\": dial tcp 172.24.4.133:6443: connect: connection refused" node="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:41.408643 kubelet[1615]: W0515 09:19:41.408452 1615 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.24.4.133:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.24.4.133:6443: connect: connection refused May 15 09:19:41.408832 kubelet[1615]: E0515 09:19:41.408654 1615 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.24.4.133:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.24.4.133:6443: connect: connection refused" logger="UnhandledError" May 15 09:19:41.596867 kubelet[1615]: W0515 09:19:41.596730 1615 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.24.4.133:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-n-1f13e4db17.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.133:6443: connect: connection refused May 15 09:19:41.597107 kubelet[1615]: E0515 09:19:41.596874 1615 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.24.4.133:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-n-1f13e4db17.novalocal&limit=500&resourceVersion=0\": dial tcp 172.24.4.133:6443: connect: connection refused" logger="UnhandledError" May 15 09:19:41.750064 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount687177099.mount: Deactivated successfully. May 15 09:19:41.760230 env[1156]: time="2025-05-15T09:19:41.760152166Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:41.764492 env[1156]: time="2025-05-15T09:19:41.764428690Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:41.766568 env[1156]: time="2025-05-15T09:19:41.766465940Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:41.774806 env[1156]: time="2025-05-15T09:19:41.774737108Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:41.794715 env[1156]: time="2025-05-15T09:19:41.794638309Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:41.798787 env[1156]: time="2025-05-15T09:19:41.798731796Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:41.805950 env[1156]: time="2025-05-15T09:19:41.805896296Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:41.816134 env[1156]: time="2025-05-15T09:19:41.816046995Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:41.820773 env[1156]: time="2025-05-15T09:19:41.820701845Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:41.824130 env[1156]: time="2025-05-15T09:19:41.824083742Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:41.829148 env[1156]: time="2025-05-15T09:19:41.829062929Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:41.832362 env[1156]: time="2025-05-15T09:19:41.832314535Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:41.868787 env[1156]: time="2025-05-15T09:19:41.867736411Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 09:19:41.868787 env[1156]: time="2025-05-15T09:19:41.867775354Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 09:19:41.868787 env[1156]: time="2025-05-15T09:19:41.867788567Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 09:19:41.868787 env[1156]: time="2025-05-15T09:19:41.867959722Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ff2cb68b542cf68db7701c8152138b5807a22d3d69756f80ec2b32976ccef1df pid=1653 runtime=io.containerd.runc.v2 May 15 09:19:41.875898 env[1156]: time="2025-05-15T09:19:41.875837296Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 09:19:41.876094 env[1156]: time="2025-05-15T09:19:41.875875166Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 09:19:41.876094 env[1156]: time="2025-05-15T09:19:41.876075385Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 09:19:41.876405 env[1156]: time="2025-05-15T09:19:41.876349209Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/808c17719614ae384fa3f38603b3642fe639e31234fa9e4d35edf32554c5293b pid=1675 runtime=io.containerd.runc.v2 May 15 09:19:41.884927 env[1156]: time="2025-05-15T09:19:41.884856732Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 09:19:41.885048 env[1156]: time="2025-05-15T09:19:41.884926611Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 09:19:41.885048 env[1156]: time="2025-05-15T09:19:41.884955093Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 09:19:41.885128 env[1156]: time="2025-05-15T09:19:41.885103687Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e70d43c2010c3414f1510add00b3876901dd21287d789cbdddc62ad39c4a6994 pid=1697 runtime=io.containerd.runc.v2 May 15 09:19:41.889053 systemd[1]: Started cri-containerd-ff2cb68b542cf68db7701c8152138b5807a22d3d69756f80ec2b32976ccef1df.scope. May 15 09:19:41.894800 kubelet[1615]: W0515 09:19:41.889780 1615 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.24.4.133:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.133:6443: connect: connection refused May 15 09:19:41.894800 kubelet[1615]: E0515 09:19:41.889844 1615 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.24.4.133:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.24.4.133:6443: connect: connection refused" logger="UnhandledError" May 15 09:19:41.907587 kubelet[1615]: W0515 09:19:41.907502 1615 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.24.4.133:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.133:6443: connect: connection refused May 15 09:19:41.907732 kubelet[1615]: E0515 09:19:41.907597 1615 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.24.4.133:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.24.4.133:6443: connect: connection refused" logger="UnhandledError" May 15 09:19:41.910309 systemd[1]: Started cri-containerd-e70d43c2010c3414f1510add00b3876901dd21287d789cbdddc62ad39c4a6994.scope. May 15 09:19:41.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.916000 audit: BPF prog-id=55 op=LOAD May 15 09:19:41.917000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.917000 audit[1665]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1653 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:41.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666326362363862353432636636386462373730316338313532313338 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1653 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:41.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666326362363862353432636636386462373730316338313532313338 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit: BPF prog-id=56 op=LOAD May 15 09:19:41.918000 audit[1665]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000378b30 items=0 ppid=1653 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:41.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666326362363862353432636636386462373730316338313532313338 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit: BPF prog-id=57 op=LOAD May 15 09:19:41.918000 audit[1665]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000378b78 items=0 ppid=1653 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:41.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666326362363862353432636636386462373730316338313532313338 May 15 09:19:41.918000 audit: BPF prog-id=57 op=UNLOAD May 15 09:19:41.918000 audit: BPF prog-id=56 op=UNLOAD May 15 09:19:41.918000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { perfmon } for pid=1665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit[1665]: AVC avc: denied { bpf } for pid=1665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.918000 audit: BPF prog-id=58 op=LOAD May 15 09:19:41.918000 audit[1665]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000378f88 items=0 ppid=1653 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:41.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666326362363862353432636636386462373730316338313532313338 May 15 09:19:41.928429 systemd[1]: Started cri-containerd-808c17719614ae384fa3f38603b3642fe639e31234fa9e4d35edf32554c5293b.scope. May 15 09:19:41.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.944000 audit: BPF prog-id=59 op=LOAD May 15 09:19:41.945000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1675 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:41.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830386331373731393631346165333834666133663338363033623336 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1675 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:41.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830386331373731393631346165333834666133663338363033623336 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit: BPF prog-id=60 op=LOAD May 15 09:19:41.945000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000279d90 items=0 ppid=1675 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:41.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830386331373731393631346165333834666133663338363033623336 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit: BPF prog-id=61 op=LOAD May 15 09:19:41.945000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000279dd8 items=0 ppid=1675 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:41.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830386331373731393631346165333834666133663338363033623336 May 15 09:19:41.945000 audit: BPF prog-id=61 op=UNLOAD May 15 09:19:41.945000 audit: BPF prog-id=60 op=UNLOAD May 15 09:19:41.945000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.945000 audit: BPF prog-id=62 op=LOAD May 15 09:19:41.945000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00036c1e8 items=0 ppid=1675 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:41.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830386331373731393631346165333834666133663338363033623336 May 15 09:19:41.963385 env[1156]: time="2025-05-15T09:19:41.963343796Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-7-n-1f13e4db17.novalocal,Uid:d9974dc4032c929f418e2b68dee23dc1,Namespace:kube-system,Attempt:0,} returns sandbox id \"ff2cb68b542cf68db7701c8152138b5807a22d3d69756f80ec2b32976ccef1df\"" May 15 09:19:41.966510 env[1156]: time="2025-05-15T09:19:41.966483918Z" level=info msg="CreateContainer within sandbox \"ff2cb68b542cf68db7701c8152138b5807a22d3d69756f80ec2b32976ccef1df\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 15 09:19:41.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.968000 audit: BPF prog-id=63 op=LOAD May 15 09:19:41.969000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.969000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1697 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:41.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537306434336332303130633334313466313531306164643030623338 May 15 09:19:41.969000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.969000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=1697 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:41.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537306434336332303130633334313466313531306164643030623338 May 15 09:19:41.969000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.969000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.969000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.969000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.969000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.969000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.969000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.969000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.969000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.969000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.969000 audit: BPF prog-id=64 op=LOAD May 15 09:19:41.969000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0000245d0 items=0 ppid=1697 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:41.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537306434336332303130633334313466313531306164643030623338 May 15 09:19:41.969000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.969000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.969000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.969000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.969000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.969000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.969000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.969000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.969000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.969000 audit: BPF prog-id=65 op=LOAD May 15 09:19:41.969000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000024618 items=0 ppid=1697 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:41.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537306434336332303130633334313466313531306164643030623338 May 15 09:19:41.970000 audit: BPF prog-id=65 op=UNLOAD May 15 09:19:41.970000 audit: BPF prog-id=64 op=UNLOAD May 15 09:19:41.970000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.970000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.970000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.970000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.970000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.970000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.970000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.970000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.970000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.970000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:41.970000 audit: BPF prog-id=66 op=LOAD May 15 09:19:41.970000 audit[1711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000024a28 items=0 ppid=1697 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:41.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537306434336332303130633334313466313531306164643030623338 May 15 09:19:41.992781 kubelet[1615]: E0515 09:19:41.992725 1615 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.133:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-n-1f13e4db17.novalocal?timeout=10s\": dial tcp 172.24.4.133:6443: connect: connection refused" interval="1.6s" May 15 09:19:41.993595 env[1156]: time="2025-05-15T09:19:41.993550020Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal,Uid:927acfbd23b1a64ba46eef94ed6898ad,Namespace:kube-system,Attempt:0,} returns sandbox id \"808c17719614ae384fa3f38603b3642fe639e31234fa9e4d35edf32554c5293b\"" May 15 09:19:41.998941 env[1156]: time="2025-05-15T09:19:41.998906111Z" level=info msg="CreateContainer within sandbox \"808c17719614ae384fa3f38603b3642fe639e31234fa9e4d35edf32554c5293b\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 15 09:19:42.002321 env[1156]: time="2025-05-15T09:19:42.002277081Z" level=info msg="CreateContainer within sandbox \"ff2cb68b542cf68db7701c8152138b5807a22d3d69756f80ec2b32976ccef1df\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"474643dae436fab0680a224f65f75cccf1770d55e304aa8f868167d9d28d0165\"" May 15 09:19:42.009551 env[1156]: time="2025-05-15T09:19:42.003495246Z" level=info msg="StartContainer for \"474643dae436fab0680a224f65f75cccf1770d55e304aa8f868167d9d28d0165\"" May 15 09:19:42.021910 env[1156]: time="2025-05-15T09:19:42.021851071Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-7-n-1f13e4db17.novalocal,Uid:215a3b5d5db3833873b336f37903bd31,Namespace:kube-system,Attempt:0,} returns sandbox id \"e70d43c2010c3414f1510add00b3876901dd21287d789cbdddc62ad39c4a6994\"" May 15 09:19:42.023939 env[1156]: time="2025-05-15T09:19:42.023899687Z" level=info msg="CreateContainer within sandbox \"e70d43c2010c3414f1510add00b3876901dd21287d789cbdddc62ad39c4a6994\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 15 09:19:42.032489 env[1156]: time="2025-05-15T09:19:42.032404444Z" level=info msg="CreateContainer within sandbox \"808c17719614ae384fa3f38603b3642fe639e31234fa9e4d35edf32554c5293b\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"32ea3d3bfc2263f7b17f37195deb7c00404ae57f7f182b0239b67dcd78f5b7fe\"" May 15 09:19:42.032967 env[1156]: time="2025-05-15T09:19:42.032933329Z" level=info msg="StartContainer for \"32ea3d3bfc2263f7b17f37195deb7c00404ae57f7f182b0239b67dcd78f5b7fe\"" May 15 09:19:42.036051 systemd[1]: Started cri-containerd-474643dae436fab0680a224f65f75cccf1770d55e304aa8f868167d9d28d0165.scope. May 15 09:19:42.058739 env[1156]: time="2025-05-15T09:19:42.058672193Z" level=info msg="CreateContainer within sandbox \"e70d43c2010c3414f1510add00b3876901dd21287d789cbdddc62ad39c4a6994\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"90e7533e3338c42b1a9e477e385c90a70706ec49cb5ab54bc5928243e42934d6\"" May 15 09:19:42.061911 env[1156]: time="2025-05-15T09:19:42.061875166Z" level=info msg="StartContainer for \"90e7533e3338c42b1a9e477e385c90a70706ec49cb5ab54bc5928243e42934d6\"" May 15 09:19:42.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.065000 audit: BPF prog-id=67 op=LOAD May 15 09:19:42.066000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1653 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:42.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437343634336461653433366661623036383061323234663635663735 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1653 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:42.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437343634336461653433366661623036383061323234663635663735 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit: BPF prog-id=68 op=LOAD May 15 09:19:42.066000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000388370 items=0 ppid=1653 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:42.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437343634336461653433366661623036383061323234663635663735 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit: BPF prog-id=69 op=LOAD May 15 09:19:42.066000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003883b8 items=0 ppid=1653 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:42.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437343634336461653433366661623036383061323234663635663735 May 15 09:19:42.066000 audit: BPF prog-id=69 op=UNLOAD May 15 09:19:42.066000 audit: BPF prog-id=68 op=UNLOAD May 15 09:19:42.066000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.066000 audit: BPF prog-id=70 op=LOAD May 15 09:19:42.066000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003887c8 items=0 ppid=1653 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:42.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437343634336461653433366661623036383061323234663635663735 May 15 09:19:42.079614 systemd[1]: Started cri-containerd-32ea3d3bfc2263f7b17f37195deb7c00404ae57f7f182b0239b67dcd78f5b7fe.scope. May 15 09:19:42.098323 systemd[1]: Started cri-containerd-90e7533e3338c42b1a9e477e385c90a70706ec49cb5ab54bc5928243e42934d6.scope. May 15 09:19:42.125289 env[1156]: time="2025-05-15T09:19:42.125232170Z" level=info msg="StartContainer for \"474643dae436fab0680a224f65f75cccf1770d55e304aa8f868167d9d28d0165\" returns successfully" May 15 09:19:42.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.129000 audit: BPF prog-id=71 op=LOAD May 15 09:19:42.129000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.129000 audit[1818]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1697 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:42.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930653735333365333333386334326231613965343737653338356339 May 15 09:19:42.130000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.130000 audit[1818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1697 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:42.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930653735333365333333386334326231613965343737653338356339 May 15 09:19:42.130000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.130000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.130000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.130000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.130000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.130000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.130000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.130000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.130000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.130000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.130000 audit: BPF prog-id=72 op=LOAD May 15 09:19:42.130000 audit[1818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003fca80 items=0 ppid=1697 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:42.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930653735333365333333386334326231613965343737653338356339 May 15 09:19:42.131000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.131000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.131000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.131000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.131000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.131000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.131000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.131000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.131000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.131000 audit: BPF prog-id=73 op=LOAD May 15 09:19:42.131000 audit[1818]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003fcac8 items=0 ppid=1697 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:42.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930653735333365333333386334326231613965343737653338356339 May 15 09:19:42.131000 audit: BPF prog-id=73 op=UNLOAD May 15 09:19:42.131000 audit: BPF prog-id=72 op=UNLOAD May 15 09:19:42.131000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.131000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.131000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.131000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.131000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.131000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.131000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.131000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.131000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.131000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.131000 audit: BPF prog-id=74 op=LOAD May 15 09:19:42.131000 audit[1818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003fced8 items=0 ppid=1697 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:42.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930653735333365333333386334326231613965343737653338356339 May 15 09:19:42.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.135000 audit: BPF prog-id=75 op=LOAD May 15 09:19:42.135000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.135000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1675 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:42.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332656133643362666332323633663762313766333731393564656237 May 15 09:19:42.136000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.136000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1675 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:42.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332656133643362666332323633663762313766333731393564656237 May 15 09:19:42.136000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.136000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.136000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.136000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.136000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.136000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.136000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.136000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.136000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.136000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.136000 audit: BPF prog-id=76 op=LOAD May 15 09:19:42.136000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000955f0 items=0 ppid=1675 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:42.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332656133643362666332323633663762313766333731393564656237 May 15 09:19:42.137000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.137000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.137000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.137000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.137000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.137000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.137000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.137000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.137000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.137000 audit: BPF prog-id=77 op=LOAD May 15 09:19:42.137000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000095638 items=0 ppid=1675 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:42.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332656133643362666332323633663762313766333731393564656237 May 15 09:19:42.137000 audit: BPF prog-id=77 op=UNLOAD May 15 09:19:42.137000 audit: BPF prog-id=76 op=UNLOAD May 15 09:19:42.137000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.137000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.137000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.137000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.137000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.137000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.137000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.137000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.137000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.137000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:42.137000 audit: BPF prog-id=78 op=LOAD May 15 09:19:42.137000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000095a48 items=0 ppid=1675 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:42.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332656133643362666332323633663762313766333731393564656237 May 15 09:19:42.174896 env[1156]: time="2025-05-15T09:19:42.174819924Z" level=info msg="StartContainer for \"32ea3d3bfc2263f7b17f37195deb7c00404ae57f7f182b0239b67dcd78f5b7fe\" returns successfully" May 15 09:19:42.189385 kubelet[1615]: I0515 09:19:42.189084 1615 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:42.189510 kubelet[1615]: E0515 09:19:42.189481 1615 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.24.4.133:6443/api/v1/nodes\": dial tcp 172.24.4.133:6443: connect: connection refused" node="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:42.213808 env[1156]: time="2025-05-15T09:19:42.213759320Z" level=info msg="StartContainer for \"90e7533e3338c42b1a9e477e385c90a70706ec49cb5ab54bc5928243e42934d6\" returns successfully" May 15 09:19:43.791985 kubelet[1615]: I0515 09:19:43.791937 1615 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:43.794000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:19:43.797305 kernel: kauditd_printk_skb: 561 callbacks suppressed May 15 09:19:43.797440 kernel: audit: type=1400 audit(1747300783.794:561): avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:19:43.794000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000056b40 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:19:43.794000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:19:43.823962 kernel: audit: type=1300 audit(1747300783.794:561): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000056b40 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:19:43.824028 kernel: audit: type=1327 audit(1747300783.794:561): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:19:43.795000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:19:43.795000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000bd6040 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:19:43.845249 kernel: audit: type=1400 audit(1747300783.795:562): avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:19:43.845334 kernel: audit: type=1300 audit(1747300783.795:562): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000bd6040 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:19:43.845357 kernel: audit: type=1327 audit(1747300783.795:562): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:19:43.795000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:19:44.531000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:19:44.538548 kernel: audit: type=1400 audit(1747300784.531:563): avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:19:44.531000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c003940c90 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:19:44.546584 kernel: audit: type=1300 audit(1747300784.531:563): arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c003940c90 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:19:44.531000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:19:44.553554 kernel: audit: type=1327 audit(1747300784.531:563): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:19:44.558000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:19:44.558000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c007050b70 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:19:44.558000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:19:44.558000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:19:44.558000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c007050bd0 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:19:44.558000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:19:44.565560 kernel: audit: type=1400 audit(1747300784.558:564): avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:19:44.558000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:19:44.558000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0030fb320 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:19:44.558000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:19:44.559000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:19:44.559000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c007050c60 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:19:44.559000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:19:44.566000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:19:44.566000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c002ff2420 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:19:44.566000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:19:44.691713 kubelet[1615]: E0515 09:19:44.691670 1615 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-7-n-1f13e4db17.novalocal\" not found" node="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:44.720181 kubelet[1615]: I0515 09:19:44.720156 1615 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:45.379098 kubelet[1615]: E0515 09:19:45.379042 1615 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:45.555032 kubelet[1615]: I0515 09:19:45.554989 1615 apiserver.go:52] "Watching apiserver" May 15 09:19:45.575400 kubelet[1615]: W0515 09:19:45.575348 1615 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 15 09:19:45.588002 kubelet[1615]: I0515 09:19:45.587960 1615 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 15 09:19:47.412890 systemd[1]: Reloading. May 15 09:19:47.562993 /usr/lib/systemd/system-generators/torcx-generator[1900]: time="2025-05-15T09:19:47Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 09:19:47.564356 /usr/lib/systemd/system-generators/torcx-generator[1900]: time="2025-05-15T09:19:47Z" level=info msg="torcx already run" May 15 09:19:47.649656 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 09:19:47.649677 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 09:19:47.673333 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 09:19:47.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.758000 audit: BPF prog-id=79 op=LOAD May 15 09:19:47.758000 audit: BPF prog-id=59 op=UNLOAD May 15 09:19:47.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.759000 audit: BPF prog-id=80 op=LOAD May 15 09:19:47.759000 audit: BPF prog-id=63 op=UNLOAD May 15 09:19:47.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.760000 audit: BPF prog-id=81 op=LOAD May 15 09:19:47.760000 audit: BPF prog-id=75 op=UNLOAD May 15 09:19:47.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.761000 audit: BPF prog-id=82 op=LOAD May 15 09:19:47.761000 audit: BPF prog-id=40 op=UNLOAD May 15 09:19:47.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.761000 audit: BPF prog-id=83 op=LOAD May 15 09:19:47.761000 audit: BPF prog-id=41 op=UNLOAD May 15 09:19:47.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.764000 audit: BPF prog-id=84 op=LOAD May 15 09:19:47.764000 audit: BPF prog-id=42 op=UNLOAD May 15 09:19:47.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit: BPF prog-id=85 op=LOAD May 15 09:19:47.766000 audit: BPF prog-id=43 op=UNLOAD May 15 09:19:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit: BPF prog-id=86 op=LOAD May 15 09:19:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit: BPF prog-id=87 op=LOAD May 15 09:19:47.766000 audit: BPF prog-id=44 op=UNLOAD May 15 09:19:47.766000 audit: BPF prog-id=45 op=UNLOAD May 15 09:19:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.766000 audit: BPF prog-id=88 op=LOAD May 15 09:19:47.766000 audit: BPF prog-id=46 op=UNLOAD May 15 09:19:47.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.768000 audit: BPF prog-id=89 op=LOAD May 15 09:19:47.768000 audit: BPF prog-id=55 op=UNLOAD May 15 09:19:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.769000 audit: BPF prog-id=90 op=LOAD May 15 09:19:47.769000 audit: BPF prog-id=67 op=UNLOAD May 15 09:19:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.770000 audit: BPF prog-id=91 op=LOAD May 15 09:19:47.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.770000 audit: BPF prog-id=92 op=LOAD May 15 09:19:47.770000 audit: BPF prog-id=47 op=UNLOAD May 15 09:19:47.770000 audit: BPF prog-id=48 op=UNLOAD May 15 09:19:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit: BPF prog-id=93 op=LOAD May 15 09:19:47.771000 audit: BPF prog-id=49 op=UNLOAD May 15 09:19:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit: BPF prog-id=94 op=LOAD May 15 09:19:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.771000 audit: BPF prog-id=95 op=LOAD May 15 09:19:47.771000 audit: BPF prog-id=50 op=UNLOAD May 15 09:19:47.771000 audit: BPF prog-id=51 op=UNLOAD May 15 09:19:47.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.772000 audit: BPF prog-id=96 op=LOAD May 15 09:19:47.772000 audit: BPF prog-id=71 op=UNLOAD May 15 09:19:47.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.773000 audit: BPF prog-id=97 op=LOAD May 15 09:19:47.773000 audit: BPF prog-id=52 op=UNLOAD May 15 09:19:47.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.773000 audit: BPF prog-id=98 op=LOAD May 15 09:19:47.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:47.773000 audit: BPF prog-id=99 op=LOAD May 15 09:19:47.773000 audit: BPF prog-id=53 op=UNLOAD May 15 09:19:47.773000 audit: BPF prog-id=54 op=UNLOAD May 15 09:19:47.787165 kubelet[1615]: I0515 09:19:47.787117 1615 dynamic_cafile_content.go:174] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 09:19:47.789323 systemd[1]: Stopping kubelet.service... May 15 09:19:47.806959 systemd[1]: kubelet.service: Deactivated successfully. May 15 09:19:47.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:47.807150 systemd[1]: Stopped kubelet.service. May 15 09:19:47.807214 systemd[1]: kubelet.service: Consumed 1.209s CPU time. May 15 09:19:47.808901 systemd[1]: Starting kubelet.service... May 15 09:19:48.021624 systemd[1]: Started kubelet.service. May 15 09:19:48.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:48.089000 kubelet[1952]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 09:19:48.089000 kubelet[1952]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 09:19:48.089000 kubelet[1952]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 09:19:48.089911 kubelet[1952]: I0515 09:19:48.089066 1952 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 09:19:48.105238 kubelet[1952]: I0515 09:19:48.105152 1952 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 15 09:19:48.105496 kubelet[1952]: I0515 09:19:48.105472 1952 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 09:19:48.106614 kubelet[1952]: I0515 09:19:48.106581 1952 server.go:929] "Client rotation is on, will bootstrap in background" May 15 09:19:48.108673 kubelet[1952]: I0515 09:19:48.108615 1952 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 15 09:19:48.111568 kubelet[1952]: I0515 09:19:48.111498 1952 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 09:19:48.117081 kubelet[1952]: E0515 09:19:48.117027 1952 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 15 09:19:48.117081 kubelet[1952]: I0515 09:19:48.117066 1952 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 15 09:19:48.120249 kubelet[1952]: I0515 09:19:48.120214 1952 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 09:19:48.120444 kubelet[1952]: I0515 09:19:48.120350 1952 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 15 09:19:48.120598 kubelet[1952]: I0515 09:19:48.120481 1952 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 09:19:48.120728 kubelet[1952]: I0515 09:19:48.120508 1952 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-7-n-1f13e4db17.novalocal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 15 09:19:48.120985 kubelet[1952]: I0515 09:19:48.120801 1952 topology_manager.go:138] "Creating topology manager with none policy" May 15 09:19:48.120985 kubelet[1952]: I0515 09:19:48.120815 1952 container_manager_linux.go:300] "Creating device plugin manager" May 15 09:19:48.120985 kubelet[1952]: I0515 09:19:48.120889 1952 state_mem.go:36] "Initialized new in-memory state store" May 15 09:19:48.121154 kubelet[1952]: I0515 09:19:48.121033 1952 kubelet.go:408] "Attempting to sync node with API server" May 15 09:19:48.121154 kubelet[1952]: I0515 09:19:48.121048 1952 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 09:19:48.121154 kubelet[1952]: I0515 09:19:48.121085 1952 kubelet.go:314] "Adding apiserver pod source" May 15 09:19:48.121154 kubelet[1952]: I0515 09:19:48.121116 1952 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 09:19:48.130567 kubelet[1952]: I0515 09:19:48.128372 1952 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 09:19:48.130567 kubelet[1952]: I0515 09:19:48.128870 1952 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 09:19:48.130567 kubelet[1952]: I0515 09:19:48.129409 1952 server.go:1269] "Started kubelet" May 15 09:19:48.131552 kubelet[1952]: I0515 09:19:48.131472 1952 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 09:19:48.137000 audit[1952]: AVC avc: denied { mac_admin } for pid=1952 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:48.137000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 09:19:48.137000 audit[1952]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bf2a80 a1=c000b7fa40 a2=c000bf2a50 a3=25 items=0 ppid=1 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:48.137000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 09:19:48.137000 audit[1952]: AVC avc: denied { mac_admin } for pid=1952 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:48.137000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 09:19:48.137000 audit[1952]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b91460 a1=c000b7fa58 a2=c000bf2b10 a3=25 items=0 ppid=1 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:48.137000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 09:19:48.139888 kubelet[1952]: I0515 09:19:48.138492 1952 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 09:19:48.139888 kubelet[1952]: I0515 09:19:48.138587 1952 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 09:19:48.139888 kubelet[1952]: I0515 09:19:48.138667 1952 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 09:19:48.143772 kubelet[1952]: I0515 09:19:48.143720 1952 server.go:460] "Adding debug handlers to kubelet server" May 15 09:19:48.149623 kubelet[1952]: I0515 09:19:48.144914 1952 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 15 09:19:48.149623 kubelet[1952]: I0515 09:19:48.147873 1952 volume_manager.go:289] "Starting Kubelet Volume Manager" May 15 09:19:48.149623 kubelet[1952]: E0515 09:19:48.148681 1952 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510-3-7-n-1f13e4db17.novalocal\" not found" May 15 09:19:48.155580 kubelet[1952]: I0515 09:19:48.153095 1952 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 15 09:19:48.155580 kubelet[1952]: I0515 09:19:48.153304 1952 reconciler.go:26] "Reconciler: start to sync state" May 15 09:19:48.156329 kubelet[1952]: I0515 09:19:48.131816 1952 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 09:19:48.157101 kubelet[1952]: I0515 09:19:48.157058 1952 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 09:19:48.165582 kubelet[1952]: I0515 09:19:48.164854 1952 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 09:19:48.166330 kubelet[1952]: I0515 09:19:48.166315 1952 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 09:19:48.166444 kubelet[1952]: I0515 09:19:48.166433 1952 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 09:19:48.166561 kubelet[1952]: I0515 09:19:48.166549 1952 kubelet.go:2321] "Starting kubelet main sync loop" May 15 09:19:48.166688 kubelet[1952]: E0515 09:19:48.166663 1952 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 09:19:48.188603 kubelet[1952]: I0515 09:19:48.185825 1952 factory.go:221] Registration of the systemd container factory successfully May 15 09:19:48.188603 kubelet[1952]: I0515 09:19:48.185973 1952 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 09:19:48.189951 kubelet[1952]: I0515 09:19:48.189918 1952 factory.go:221] Registration of the containerd container factory successfully May 15 09:19:48.267630 kubelet[1952]: E0515 09:19:48.267591 1952 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 15 09:19:48.281178 kubelet[1952]: I0515 09:19:48.277143 1952 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 09:19:48.281372 kubelet[1952]: I0515 09:19:48.281352 1952 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 09:19:48.281498 kubelet[1952]: I0515 09:19:48.281483 1952 state_mem.go:36] "Initialized new in-memory state store" May 15 09:19:48.282212 kubelet[1952]: I0515 09:19:48.282191 1952 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 15 09:19:48.282361 kubelet[1952]: I0515 09:19:48.282322 1952 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 15 09:19:48.282469 kubelet[1952]: I0515 09:19:48.282456 1952 policy_none.go:49] "None policy: Start" May 15 09:19:48.285342 kubelet[1952]: I0515 09:19:48.285311 1952 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 09:19:48.285587 kubelet[1952]: I0515 09:19:48.285381 1952 state_mem.go:35] "Initializing new in-memory state store" May 15 09:19:48.285730 kubelet[1952]: I0515 09:19:48.285713 1952 state_mem.go:75] "Updated machine memory state" May 15 09:19:48.307000 audit[1952]: AVC avc: denied { mac_admin } for pid=1952 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:48.307000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 09:19:48.307000 audit[1952]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000fbe180 a1=c00107db18 a2=c000fbe150 a3=25 items=0 ppid=1 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:48.307000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 09:19:48.308341 kubelet[1952]: I0515 09:19:48.307779 1952 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 09:19:48.308341 kubelet[1952]: I0515 09:19:48.307864 1952 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 09:19:48.308341 kubelet[1952]: I0515 09:19:48.308143 1952 eviction_manager.go:189] "Eviction manager: starting control loop" May 15 09:19:48.310318 kubelet[1952]: I0515 09:19:48.308302 1952 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 09:19:48.310318 kubelet[1952]: I0515 09:19:48.309289 1952 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 09:19:48.433367 kubelet[1952]: I0515 09:19:48.433328 1952 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:48.453455 kubelet[1952]: I0515 09:19:48.453316 1952 kubelet_node_status.go:111] "Node was previously registered" node="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:48.453455 kubelet[1952]: I0515 09:19:48.453463 1952 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:48.483400 kubelet[1952]: W0515 09:19:48.482922 1952 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 15 09:19:48.490157 kubelet[1952]: W0515 09:19:48.489433 1952 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 15 09:19:48.490157 kubelet[1952]: E0515 09:19:48.489498 1952 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-7-n-1f13e4db17.novalocal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:48.490333 kubelet[1952]: W0515 09:19:48.490275 1952 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 15 09:19:48.506000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:19:48.506000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b24180 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:19:48.506000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:19:48.507000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:19:48.507000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000aa1900 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:19:48.507000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:19:48.509000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:19:48.509000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000aa1be0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:19:48.509000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:19:48.510000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:19:48.510000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000aa1da0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:19:48.510000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:19:48.555969 kubelet[1952]: I0515 09:19:48.555079 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/215a3b5d5db3833873b336f37903bd31-kubeconfig\") pod \"kube-scheduler-ci-3510-3-7-n-1f13e4db17.novalocal\" (UID: \"215a3b5d5db3833873b336f37903bd31\") " pod="kube-system/kube-scheduler-ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:48.555969 kubelet[1952]: I0515 09:19:48.555118 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/927acfbd23b1a64ba46eef94ed6898ad-ca-certs\") pod \"kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal\" (UID: \"927acfbd23b1a64ba46eef94ed6898ad\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:48.555969 kubelet[1952]: I0515 09:19:48.555143 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/927acfbd23b1a64ba46eef94ed6898ad-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal\" (UID: \"927acfbd23b1a64ba46eef94ed6898ad\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:48.555969 kubelet[1952]: I0515 09:19:48.555206 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/927acfbd23b1a64ba46eef94ed6898ad-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal\" (UID: \"927acfbd23b1a64ba46eef94ed6898ad\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:48.555969 kubelet[1952]: I0515 09:19:48.555231 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d9974dc4032c929f418e2b68dee23dc1-ca-certs\") pod \"kube-apiserver-ci-3510-3-7-n-1f13e4db17.novalocal\" (UID: \"d9974dc4032c929f418e2b68dee23dc1\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:48.556238 kubelet[1952]: I0515 09:19:48.555251 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d9974dc4032c929f418e2b68dee23dc1-k8s-certs\") pod \"kube-apiserver-ci-3510-3-7-n-1f13e4db17.novalocal\" (UID: \"d9974dc4032c929f418e2b68dee23dc1\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:48.556238 kubelet[1952]: I0515 09:19:48.555271 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d9974dc4032c929f418e2b68dee23dc1-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-7-n-1f13e4db17.novalocal\" (UID: \"d9974dc4032c929f418e2b68dee23dc1\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:48.556238 kubelet[1952]: I0515 09:19:48.555290 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/927acfbd23b1a64ba46eef94ed6898ad-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal\" (UID: \"927acfbd23b1a64ba46eef94ed6898ad\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:48.556238 kubelet[1952]: I0515 09:19:48.555311 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/927acfbd23b1a64ba46eef94ed6898ad-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal\" (UID: \"927acfbd23b1a64ba46eef94ed6898ad\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:48.585000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 15 09:19:48.585000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000a7b280 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:19:48.585000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:19:49.128034 kubelet[1952]: I0515 09:19:49.127974 1952 apiserver.go:52] "Watching apiserver" May 15 09:19:49.154043 kubelet[1952]: I0515 09:19:49.153988 1952 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 15 09:19:49.247631 kubelet[1952]: W0515 09:19:49.247546 1952 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 15 09:19:49.248117 kubelet[1952]: E0515 09:19:49.248042 1952 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal\" already exists" pod="kube-system/kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:19:49.312004 kubelet[1952]: I0515 09:19:49.311868 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-7-n-1f13e4db17.novalocal" podStartSLOduration=4.311782528 podStartE2EDuration="4.311782528s" podCreationTimestamp="2025-05-15 09:19:45 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 09:19:49.294821652 +0000 UTC m=+1.265415653" watchObservedRunningTime="2025-05-15 09:19:49.311782528 +0000 UTC m=+1.282376549" May 15 09:19:49.335014 kubelet[1952]: I0515 09:19:49.334929 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-7-n-1f13e4db17.novalocal" podStartSLOduration=1.334906513 podStartE2EDuration="1.334906513s" podCreationTimestamp="2025-05-15 09:19:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 09:19:49.312976855 +0000 UTC m=+1.283570857" watchObservedRunningTime="2025-05-15 09:19:49.334906513 +0000 UTC m=+1.305500484" May 15 09:19:49.353984 kubelet[1952]: I0515 09:19:49.353890 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-7-n-1f13e4db17.novalocal" podStartSLOduration=1.353873 podStartE2EDuration="1.353873s" podCreationTimestamp="2025-05-15 09:19:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 09:19:49.335080922 +0000 UTC m=+1.305674893" watchObservedRunningTime="2025-05-15 09:19:49.353873 +0000 UTC m=+1.324466981" May 15 09:19:53.070415 kubelet[1952]: I0515 09:19:53.070335 1952 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 15 09:19:53.071506 env[1156]: time="2025-05-15T09:19:53.070822489Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 15 09:19:53.072021 kubelet[1952]: I0515 09:19:53.071988 1952 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 15 09:19:53.266590 kernel: kauditd_printk_skb: 287 callbacks suppressed May 15 09:19:53.266716 kernel: audit: type=1106 audit(1747300793.262:823): pid=1335 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 09:19:53.262000 audit[1335]: USER_END pid=1335 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 09:19:53.263260 sudo[1335]: pam_unix(sudo:session): session closed for user root May 15 09:19:53.262000 audit[1335]: CRED_DISP pid=1335 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 09:19:53.276992 kernel: audit: type=1104 audit(1747300793.262:824): pid=1335 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 09:19:53.436020 sshd[1331]: pam_unix(sshd:session): session closed for user core May 15 09:19:53.440000 audit[1331]: USER_END pid=1331 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:19:53.441000 audit[1331]: CRED_DISP pid=1331 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:19:53.462841 systemd[1]: sshd@8-172.24.4.133:22-172.24.4.1:35644.service: Deactivated successfully. May 15 09:19:53.467825 systemd[1]: session-9.scope: Deactivated successfully. May 15 09:19:53.468638 systemd[1]: session-9.scope: Consumed 7.423s CPU time. May 15 09:19:53.471236 systemd-logind[1148]: Session 9 logged out. Waiting for processes to exit. May 15 09:19:53.476016 kernel: audit: type=1106 audit(1747300793.440:825): pid=1331 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:19:53.476145 kernel: audit: type=1104 audit(1747300793.441:826): pid=1331 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:19:53.475502 systemd-logind[1148]: Removed session 9. May 15 09:19:53.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.133:22-172.24.4.1:35644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:53.498320 kernel: audit: type=1131 audit(1747300793.461:827): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.133:22-172.24.4.1:35644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:19:54.147779 systemd[1]: Created slice kubepods-besteffort-pod7783f128_3623_444a_9b30_af62bef092cd.slice. May 15 09:19:54.204604 kubelet[1952]: I0515 09:19:54.204506 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/7783f128-3623-444a-9b30-af62bef092cd-kube-proxy\") pod \"kube-proxy-j96jg\" (UID: \"7783f128-3623-444a-9b30-af62bef092cd\") " pod="kube-system/kube-proxy-j96jg" May 15 09:19:54.205218 kubelet[1952]: I0515 09:19:54.205182 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7783f128-3623-444a-9b30-af62bef092cd-xtables-lock\") pod \"kube-proxy-j96jg\" (UID: \"7783f128-3623-444a-9b30-af62bef092cd\") " pod="kube-system/kube-proxy-j96jg" May 15 09:19:54.205349 kubelet[1952]: I0515 09:19:54.205332 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7783f128-3623-444a-9b30-af62bef092cd-lib-modules\") pod \"kube-proxy-j96jg\" (UID: \"7783f128-3623-444a-9b30-af62bef092cd\") " pod="kube-system/kube-proxy-j96jg" May 15 09:19:54.205542 kubelet[1952]: I0515 09:19:54.205485 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qhfdf\" (UniqueName: \"kubernetes.io/projected/7783f128-3623-444a-9b30-af62bef092cd-kube-api-access-qhfdf\") pod \"kube-proxy-j96jg\" (UID: \"7783f128-3623-444a-9b30-af62bef092cd\") " pod="kube-system/kube-proxy-j96jg" May 15 09:19:54.233662 systemd[1]: Created slice kubepods-besteffort-pod112e8857_9094_44c7_8848_ea9e627683ab.slice. May 15 09:19:54.306666 kubelet[1952]: I0515 09:19:54.306584 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q5b75\" (UniqueName: \"kubernetes.io/projected/112e8857-9094-44c7-8848-ea9e627683ab-kube-api-access-q5b75\") pod \"tigera-operator-6f6897fdc5-jbk8r\" (UID: \"112e8857-9094-44c7-8848-ea9e627683ab\") " pod="tigera-operator/tigera-operator-6f6897fdc5-jbk8r" May 15 09:19:54.306905 kubelet[1952]: I0515 09:19:54.306746 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/112e8857-9094-44c7-8848-ea9e627683ab-var-lib-calico\") pod \"tigera-operator-6f6897fdc5-jbk8r\" (UID: \"112e8857-9094-44c7-8848-ea9e627683ab\") " pod="tigera-operator/tigera-operator-6f6897fdc5-jbk8r" May 15 09:19:54.329487 kubelet[1952]: I0515 09:19:54.329386 1952 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 15 09:19:54.463247 env[1156]: time="2025-05-15T09:19:54.462997237Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-j96jg,Uid:7783f128-3623-444a-9b30-af62bef092cd,Namespace:kube-system,Attempt:0,}" May 15 09:19:54.524433 env[1156]: time="2025-05-15T09:19:54.524275509Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 09:19:54.524704 env[1156]: time="2025-05-15T09:19:54.524455199Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 09:19:54.524704 env[1156]: time="2025-05-15T09:19:54.524578551Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 09:19:54.525494 env[1156]: time="2025-05-15T09:19:54.524965011Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/289c67d418ca15659f7976b311b5aa636ec71c24de550c90c19f9ff9806fdbdf pid=2032 runtime=io.containerd.runc.v2 May 15 09:19:54.537785 env[1156]: time="2025-05-15T09:19:54.537703132Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-jbk8r,Uid:112e8857-9094-44c7-8848-ea9e627683ab,Namespace:tigera-operator,Attempt:0,}" May 15 09:19:54.566789 systemd[1]: Started cri-containerd-289c67d418ca15659f7976b311b5aa636ec71c24de550c90c19f9ff9806fdbdf.scope. May 15 09:19:54.581472 env[1156]: time="2025-05-15T09:19:54.581205400Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 09:19:54.581472 env[1156]: time="2025-05-15T09:19:54.581259533Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 09:19:54.581472 env[1156]: time="2025-05-15T09:19:54.581273840Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 09:19:54.582015 env[1156]: time="2025-05-15T09:19:54.581800765Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5cda446f31f2c4b2ff193eccdb6c00ecf50f710ebca0d95dc5b0edf9a17d8820 pid=2060 runtime=io.containerd.runc.v2 May 15 09:19:54.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.600113 kernel: audit: type=1400 audit(1747300794.588:828): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.600165 kernel: audit: type=1400 audit(1747300794.588:829): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.607681 kernel: audit: type=1400 audit(1747300794.589:830): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.615540 kernel: audit: type=1400 audit(1747300794.589:831): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.621576 kernel: audit: type=1400 audit(1747300794.589:832): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.589000 audit: BPF prog-id=100 op=LOAD May 15 09:19:54.590000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.590000 audit[2042]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2032 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:54.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238396336376434313863613135363539663739373662333131623561 May 15 09:19:54.590000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.590000 audit[2042]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2032 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:54.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238396336376434313863613135363539663739373662333131623561 May 15 09:19:54.590000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.590000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.590000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.590000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.590000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.590000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.590000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.590000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.590000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.590000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.590000 audit: BPF prog-id=101 op=LOAD May 15 09:19:54.590000 audit[2042]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003906e0 items=0 ppid=2032 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:54.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238396336376434313863613135363539663739373662333131623561 May 15 09:19:54.599000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.599000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.599000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.599000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.599000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.599000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.599000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.599000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.599000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.599000 audit: BPF prog-id=102 op=LOAD May 15 09:19:54.599000 audit[2042]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000390728 items=0 ppid=2032 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:54.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238396336376434313863613135363539663739373662333131623561 May 15 09:19:54.599000 audit: BPF prog-id=102 op=UNLOAD May 15 09:19:54.599000 audit: BPF prog-id=101 op=UNLOAD May 15 09:19:54.599000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.599000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.599000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.599000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.599000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.599000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.599000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.599000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.599000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.599000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.599000 audit: BPF prog-id=103 op=LOAD May 15 09:19:54.599000 audit[2042]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000390b38 items=0 ppid=2032 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:54.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238396336376434313863613135363539663739373662333131623561 May 15 09:19:54.639038 systemd[1]: Started cri-containerd-5cda446f31f2c4b2ff193eccdb6c00ecf50f710ebca0d95dc5b0edf9a17d8820.scope. May 15 09:19:54.651486 env[1156]: time="2025-05-15T09:19:54.651432630Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-j96jg,Uid:7783f128-3623-444a-9b30-af62bef092cd,Namespace:kube-system,Attempt:0,} returns sandbox id \"289c67d418ca15659f7976b311b5aa636ec71c24de550c90c19f9ff9806fdbdf\"" May 15 09:19:54.658583 env[1156]: time="2025-05-15T09:19:54.657662412Z" level=info msg="CreateContainer within sandbox \"289c67d418ca15659f7976b311b5aa636ec71c24de550c90c19f9ff9806fdbdf\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 15 09:19:54.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.667000 audit: BPF prog-id=104 op=LOAD May 15 09:19:54.668000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.668000 audit[2078]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000227c48 a2=10 a3=1c items=0 ppid=2060 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:54.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563646134343666333166326334623266663139336563636462366330 May 15 09:19:54.668000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.668000 audit[2078]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0002276b0 a2=3c a3=c items=0 ppid=2060 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:54.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563646134343666333166326334623266663139336563636462366330 May 15 09:19:54.668000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.668000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.668000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.668000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.668000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.668000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.668000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.668000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.668000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.668000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.668000 audit: BPF prog-id=105 op=LOAD May 15 09:19:54.668000 audit[2078]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0002279d8 a2=78 a3=c0003f0a80 items=0 ppid=2060 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:54.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563646134343666333166326334623266663139336563636462366330 May 15 09:19:54.669000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.669000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.669000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.669000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.669000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.669000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.669000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.669000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.669000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.669000 audit: BPF prog-id=106 op=LOAD May 15 09:19:54.669000 audit[2078]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000227770 a2=78 a3=c0003f0ac8 items=0 ppid=2060 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:54.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563646134343666333166326334623266663139336563636462366330 May 15 09:19:54.669000 audit: BPF prog-id=106 op=UNLOAD May 15 09:19:54.669000 audit: BPF prog-id=105 op=UNLOAD May 15 09:19:54.669000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.669000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.669000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.669000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.669000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.669000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.669000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.669000 audit[2078]: AVC avc: denied { perfmon } for pid=2078 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.669000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.669000 audit[2078]: AVC avc: denied { bpf } for pid=2078 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.669000 audit: BPF prog-id=107 op=LOAD May 15 09:19:54.669000 audit[2078]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000227c30 a2=78 a3=c0003f0ed8 items=0 ppid=2060 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:54.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563646134343666333166326334623266663139336563636462366330 May 15 09:19:54.709022 env[1156]: time="2025-05-15T09:19:54.708969988Z" level=info msg="CreateContainer within sandbox \"289c67d418ca15659f7976b311b5aa636ec71c24de550c90c19f9ff9806fdbdf\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"c7ef5be4ae01cecf9163cdc009bfe5b414801fabd04324b5c673c78d1f898176\"" May 15 09:19:54.712366 env[1156]: time="2025-05-15T09:19:54.712324642Z" level=info msg="StartContainer for \"c7ef5be4ae01cecf9163cdc009bfe5b414801fabd04324b5c673c78d1f898176\"" May 15 09:19:54.713217 env[1156]: time="2025-05-15T09:19:54.713188103Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-jbk8r,Uid:112e8857-9094-44c7-8848-ea9e627683ab,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"5cda446f31f2c4b2ff193eccdb6c00ecf50f710ebca0d95dc5b0edf9a17d8820\"" May 15 09:19:54.722566 env[1156]: time="2025-05-15T09:19:54.716112264Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 15 09:19:54.741926 systemd[1]: Started cri-containerd-c7ef5be4ae01cecf9163cdc009bfe5b414801fabd04324b5c673c78d1f898176.scope. May 15 09:19:54.762000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.762000 audit[2115]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f0b9a761a18 items=0 ppid=2032 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:54.762000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337656635626534616530316365636639313633636463303039626665 May 15 09:19:54.762000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.762000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.762000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.762000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.762000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.762000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.762000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.762000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.762000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.762000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.762000 audit: BPF prog-id=108 op=LOAD May 15 09:19:54.762000 audit[2115]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000179108 items=0 ppid=2032 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:54.762000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337656635626534616530316365636639313633636463303039626665 May 15 09:19:54.763000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.763000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.763000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.763000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.763000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.763000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.763000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.763000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.763000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.763000 audit: BPF prog-id=109 op=LOAD May 15 09:19:54.763000 audit[2115]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000179158 items=0 ppid=2032 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:54.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337656635626534616530316365636639313633636463303039626665 May 15 09:19:54.764000 audit: BPF prog-id=109 op=UNLOAD May 15 09:19:54.764000 audit: BPF prog-id=108 op=UNLOAD May 15 09:19:54.764000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.764000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.764000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.764000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.764000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.764000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.764000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.764000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.764000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.764000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:54.764000 audit: BPF prog-id=110 op=LOAD May 15 09:19:54.764000 audit[2115]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0001791e8 items=0 ppid=2032 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:54.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337656635626534616530316365636639313633636463303039626665 May 15 09:19:54.806298 env[1156]: time="2025-05-15T09:19:54.806248583Z" level=info msg="StartContainer for \"c7ef5be4ae01cecf9163cdc009bfe5b414801fabd04324b5c673c78d1f898176\" returns successfully" May 15 09:19:54.912000 audit[2175]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:54.912000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcaab21040 a2=0 a3=7ffcaab2102c items=0 ppid=2126 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:54.912000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 09:19:54.913000 audit[2176]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2176 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:54.913000 audit[2176]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff3d77000 a2=0 a3=7ffff3d76fec items=0 ppid=2126 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:54.913000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 09:19:54.915000 audit[2177]: NETFILTER_CFG table=mangle:40 family=10 entries=1 op=nft_register_chain pid=2177 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:54.915000 audit[2177]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe4e52fff0 a2=0 a3=7ffe4e52ffdc items=0 ppid=2126 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:54.915000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 09:19:54.919000 audit[2178]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:54.919000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff67ce4660 a2=0 a3=7fff67ce464c items=0 ppid=2126 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:54.919000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 09:19:54.920000 audit[2179]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2179 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:54.920000 audit[2179]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc710a7c20 a2=0 a3=7ffc710a7c0c items=0 ppid=2126 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:54.920000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 09:19:54.923000 audit[2180]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2180 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:54.923000 audit[2180]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff095affc0 a2=0 a3=7fff095affac items=0 ppid=2126 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:54.923000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 09:19:55.017000 audit[2181]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:55.017000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff949af5a0 a2=0 a3=7fff949af58c items=0 ppid=2126 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.017000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 09:19:55.025000 audit[2183]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:55.025000 audit[2183]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc7d0c1b70 a2=0 a3=7ffc7d0c1b5c items=0 ppid=2126 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 15 09:19:55.030000 audit[2186]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:55.030000 audit[2186]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc2ec7b880 a2=0 a3=7ffc2ec7b86c items=0 ppid=2126 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.030000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 15 09:19:55.032000 audit[2187]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:55.032000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc43f303b0 a2=0 a3=7ffc43f3039c items=0 ppid=2126 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.032000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 09:19:55.035000 audit[2189]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2189 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:55.035000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe7b7883d0 a2=0 a3=7ffe7b7883bc items=0 ppid=2126 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 09:19:55.037000 audit[2190]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:55.037000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdbf5a87c0 a2=0 a3=7ffdbf5a87ac items=0 ppid=2126 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.037000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 09:19:55.040000 audit[2192]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:55.040000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe228fe200 a2=0 a3=7ffe228fe1ec items=0 ppid=2126 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.040000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 09:19:55.046000 audit[2195]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:55.046000 audit[2195]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc285632e0 a2=0 a3=7ffc285632cc items=0 ppid=2126 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.046000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 15 09:19:55.047000 audit[2196]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:55.047000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf54ca8f0 a2=0 a3=7ffcf54ca8dc items=0 ppid=2126 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.047000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 09:19:55.051000 audit[2198]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:55.051000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd4f79e250 a2=0 a3=7ffd4f79e23c items=0 ppid=2126 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.051000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 09:19:55.053000 audit[2199]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:55.053000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca78e26b0 a2=0 a3=7ffca78e269c items=0 ppid=2126 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.053000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 09:19:55.056000 audit[2201]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:55.056000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff3161f3e0 a2=0 a3=7fff3161f3cc items=0 ppid=2126 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.056000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 09:19:55.061000 audit[2204]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:55.061000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd5b4c3b20 a2=0 a3=7ffd5b4c3b0c items=0 ppid=2126 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.061000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 09:19:55.066000 audit[2207]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:55.066000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffec63a49f0 a2=0 a3=7ffec63a49dc items=0 ppid=2126 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.066000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 09:19:55.067000 audit[2208]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:55.067000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc90c83000 a2=0 a3=7ffc90c82fec items=0 ppid=2126 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.067000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 09:19:55.071000 audit[2210]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:55.071000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fff7b6f7870 a2=0 a3=7fff7b6f785c items=0 ppid=2126 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.071000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 09:19:55.076000 audit[2213]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:55.076000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd661c5540 a2=0 a3=7ffd661c552c items=0 ppid=2126 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.076000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 09:19:55.077000 audit[2214]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:55.077000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb0f7eda0 a2=0 a3=7ffdb0f7ed8c items=0 ppid=2126 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.077000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 09:19:55.084000 audit[2216]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 09:19:55.084000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd36b204e0 a2=0 a3=7ffd36b204cc items=0 ppid=2126 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.084000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 09:19:55.140000 audit[2222]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:19:55.140000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffca400cf10 a2=0 a3=7ffca400cefc items=0 ppid=2126 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.140000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:19:55.152000 audit[2222]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:19:55.152000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffca400cf10 a2=0 a3=7ffca400cefc items=0 ppid=2126 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.152000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:19:55.155000 audit[2227]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:55.155000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff62297460 a2=0 a3=7fff6229744c items=0 ppid=2126 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.155000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 09:19:55.161000 audit[2229]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:55.161000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc37c88460 a2=0 a3=7ffc37c8844c items=0 ppid=2126 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.161000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 15 09:19:55.166000 audit[2232]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:55.166000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc2f4e9990 a2=0 a3=7ffc2f4e997c items=0 ppid=2126 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.166000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 15 09:19:55.167000 audit[2233]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:55.167000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcceabbf60 a2=0 a3=7ffcceabbf4c items=0 ppid=2126 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.167000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 09:19:55.170000 audit[2235]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:55.170000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffebf4713b0 a2=0 a3=7ffebf47139c items=0 ppid=2126 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.170000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 09:19:55.171000 audit[2236]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:55.171000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc23e4ce0 a2=0 a3=7fffc23e4ccc items=0 ppid=2126 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.171000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 09:19:55.174000 audit[2238]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2238 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:55.174000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdf087d3d0 a2=0 a3=7ffdf087d3bc items=0 ppid=2126 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.174000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 15 09:19:55.177000 audit[2241]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:55.177000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff889decd0 a2=0 a3=7fff889decbc items=0 ppid=2126 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.177000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 09:19:55.179000 audit[2242]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:55.179000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2d438b50 a2=0 a3=7ffc2d438b3c items=0 ppid=2126 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.179000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 09:19:55.181000 audit[2244]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:55.181000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc88a81380 a2=0 a3=7ffc88a8136c items=0 ppid=2126 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.181000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 09:19:55.183000 audit[2245]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:55.183000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc432456e0 a2=0 a3=7ffc432456cc items=0 ppid=2126 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.183000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 09:19:55.186000 audit[2247]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:55.186000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffdde20a50 a2=0 a3=7fffdde20a3c items=0 ppid=2126 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.186000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 09:19:55.190000 audit[2250]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:55.190000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe67b309a0 a2=0 a3=7ffe67b3098c items=0 ppid=2126 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.190000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 09:19:55.194000 audit[2253]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:55.194000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcada10da0 a2=0 a3=7ffcada10d8c items=0 ppid=2126 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.194000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 15 09:19:55.196000 audit[2254]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:55.196000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe99672a80 a2=0 a3=7ffe99672a6c items=0 ppid=2126 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.196000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 09:19:55.199000 audit[2256]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:55.199000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff9d376c40 a2=0 a3=7fff9d376c2c items=0 ppid=2126 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.199000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 09:19:55.204000 audit[2259]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:55.204000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd086b89f0 a2=0 a3=7ffd086b89dc items=0 ppid=2126 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.204000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 09:19:55.207000 audit[2260]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:55.207000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd697004c0 a2=0 a3=7ffd697004ac items=0 ppid=2126 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.207000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 09:19:55.212000 audit[2262]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:55.212000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe5b26f050 a2=0 a3=7ffe5b26f03c items=0 ppid=2126 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.212000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 09:19:55.214000 audit[2263]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:55.214000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc6320ca0 a2=0 a3=7ffdc6320c8c items=0 ppid=2126 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.214000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 09:19:55.217000 audit[2265]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:55.217000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff283ea020 a2=0 a3=7fff283ea00c items=0 ppid=2126 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.217000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 09:19:55.225000 audit[2268]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 09:19:55.225000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd1f94d300 a2=0 a3=7ffd1f94d2ec items=0 ppid=2126 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.225000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 09:19:55.233000 audit[2270]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 09:19:55.233000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffd29471480 a2=0 a3=7ffd2947146c items=0 ppid=2126 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.233000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:19:55.234000 audit[2270]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 09:19:55.234000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd29471480 a2=0 a3=7ffd2947146c items=0 ppid=2126 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:55.234000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:19:55.296594 kubelet[1952]: I0515 09:19:55.292587 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-j96jg" podStartSLOduration=1.289958746 podStartE2EDuration="1.289958746s" podCreationTimestamp="2025-05-15 09:19:54 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 09:19:55.287743956 +0000 UTC m=+7.258337957" watchObservedRunningTime="2025-05-15 09:19:55.289958746 +0000 UTC m=+7.260552748" May 15 09:19:56.493214 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2477668156.mount: Deactivated successfully. May 15 09:19:57.910805 env[1156]: time="2025-05-15T09:19:57.910313714Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:57.915702 env[1156]: time="2025-05-15T09:19:57.915612452Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:57.923862 env[1156]: time="2025-05-15T09:19:57.923497092Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:57.931699 env[1156]: time="2025-05-15T09:19:57.931323883Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:19:57.933982 env[1156]: time="2025-05-15T09:19:57.933836063Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 15 09:19:57.954430 env[1156]: time="2025-05-15T09:19:57.954192910Z" level=info msg="CreateContainer within sandbox \"5cda446f31f2c4b2ff193eccdb6c00ecf50f710ebca0d95dc5b0edf9a17d8820\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 15 09:19:58.013568 env[1156]: time="2025-05-15T09:19:58.010308946Z" level=info msg="CreateContainer within sandbox \"5cda446f31f2c4b2ff193eccdb6c00ecf50f710ebca0d95dc5b0edf9a17d8820\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"1707920884564c0db18cf44e1d8983bc3ddba14f5f6f9f88281e055458651aca\"" May 15 09:19:58.013568 env[1156]: time="2025-05-15T09:19:58.011184307Z" level=info msg="StartContainer for \"1707920884564c0db18cf44e1d8983bc3ddba14f5f6f9f88281e055458651aca\"" May 15 09:19:58.023773 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount781845556.mount: Deactivated successfully. May 15 09:19:58.063284 systemd[1]: run-containerd-runc-k8s.io-1707920884564c0db18cf44e1d8983bc3ddba14f5f6f9f88281e055458651aca-runc.y9SW1m.mount: Deactivated successfully. May 15 09:19:58.069293 systemd[1]: Started cri-containerd-1707920884564c0db18cf44e1d8983bc3ddba14f5f6f9f88281e055458651aca.scope. May 15 09:19:58.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.094000 audit: BPF prog-id=111 op=LOAD May 15 09:19:58.096000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.096000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2060 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:58.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137303739323038383435363463306462313863663434653164383938 May 15 09:19:58.097000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.097000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2060 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:58.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137303739323038383435363463306462313863663434653164383938 May 15 09:19:58.097000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.097000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.097000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.097000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.097000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.097000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.097000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.097000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.097000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.097000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.097000 audit: BPF prog-id=112 op=LOAD May 15 09:19:58.097000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000318ee0 items=0 ppid=2060 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:58.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137303739323038383435363463306462313863663434653164383938 May 15 09:19:58.098000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.098000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.098000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.098000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.098000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.098000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.098000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.098000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.098000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.098000 audit: BPF prog-id=113 op=LOAD May 15 09:19:58.098000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000318f28 items=0 ppid=2060 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:58.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137303739323038383435363463306462313863663434653164383938 May 15 09:19:58.099000 audit: BPF prog-id=113 op=UNLOAD May 15 09:19:58.099000 audit: BPF prog-id=112 op=UNLOAD May 15 09:19:58.099000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.099000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.099000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.099000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.099000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.099000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.099000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.099000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.099000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.099000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:19:58.099000 audit: BPF prog-id=114 op=LOAD May 15 09:19:58.099000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000319338 items=0 ppid=2060 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:19:58.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137303739323038383435363463306462313863663434653164383938 May 15 09:19:58.127810 env[1156]: time="2025-05-15T09:19:58.127680907Z" level=info msg="StartContainer for \"1707920884564c0db18cf44e1d8983bc3ddba14f5f6f9f88281e055458651aca\" returns successfully" May 15 09:20:02.180000 audit[2311]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:20:02.182695 kernel: kauditd_printk_skb: 362 callbacks suppressed May 15 09:20:02.182943 kernel: audit: type=1325 audit(1747300802.180:939): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:20:02.180000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff961020b0 a2=0 a3=7fff9610209c items=0 ppid=2126 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:02.195897 kernel: audit: type=1300 audit(1747300802.180:939): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff961020b0 a2=0 a3=7fff9610209c items=0 ppid=2126 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:02.180000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:20:02.202579 kernel: audit: type=1327 audit(1747300802.180:939): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:20:02.202000 audit[2311]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:20:02.212557 kernel: audit: type=1325 audit(1747300802.202:940): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:20:02.202000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff961020b0 a2=0 a3=0 items=0 ppid=2126 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:02.225600 kernel: audit: type=1300 audit(1747300802.202:940): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff961020b0 a2=0 a3=0 items=0 ppid=2126 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:02.202000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:20:02.231577 kernel: audit: type=1327 audit(1747300802.202:940): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:20:02.280000 audit[2313]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:20:02.280000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff93ff8760 a2=0 a3=7fff93ff874c items=0 ppid=2126 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:02.294447 kernel: audit: type=1325 audit(1747300802.280:941): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:20:02.294703 kernel: audit: type=1300 audit(1747300802.280:941): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff93ff8760 a2=0 a3=7fff93ff874c items=0 ppid=2126 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:02.280000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:20:02.300585 kernel: audit: type=1327 audit(1747300802.280:941): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:20:02.302000 audit[2313]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:20:02.308595 kernel: audit: type=1325 audit(1747300802.302:942): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:20:02.302000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff93ff8760 a2=0 a3=0 items=0 ppid=2126 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:02.302000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:20:02.451180 kubelet[1952]: I0515 09:20:02.450994 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6f6897fdc5-jbk8r" podStartSLOduration=5.228718614 podStartE2EDuration="8.450935995s" podCreationTimestamp="2025-05-15 09:19:54 +0000 UTC" firstStartedPulling="2025-05-15 09:19:54.715218255 +0000 UTC m=+6.685812236" lastFinishedPulling="2025-05-15 09:19:57.937435596 +0000 UTC m=+9.908029617" observedRunningTime="2025-05-15 09:19:58.281692812 +0000 UTC m=+10.252286783" watchObservedRunningTime="2025-05-15 09:20:02.450935995 +0000 UTC m=+14.421529966" May 15 09:20:02.463444 systemd[1]: Created slice kubepods-besteffort-pode10da218_00a1_4af4_b312_7cc557c633bf.slice. May 15 09:20:02.474009 kubelet[1952]: I0515 09:20:02.473947 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e10da218-00a1-4af4-b312-7cc557c633bf-tigera-ca-bundle\") pod \"calico-typha-7678f844c-5d5tm\" (UID: \"e10da218-00a1-4af4-b312-7cc557c633bf\") " pod="calico-system/calico-typha-7678f844c-5d5tm" May 15 09:20:02.474334 kubelet[1952]: I0515 09:20:02.474291 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5cxz7\" (UniqueName: \"kubernetes.io/projected/e10da218-00a1-4af4-b312-7cc557c633bf-kube-api-access-5cxz7\") pod \"calico-typha-7678f844c-5d5tm\" (UID: \"e10da218-00a1-4af4-b312-7cc557c633bf\") " pod="calico-system/calico-typha-7678f844c-5d5tm" May 15 09:20:02.474483 kubelet[1952]: I0515 09:20:02.474459 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/e10da218-00a1-4af4-b312-7cc557c633bf-typha-certs\") pod \"calico-typha-7678f844c-5d5tm\" (UID: \"e10da218-00a1-4af4-b312-7cc557c633bf\") " pod="calico-system/calico-typha-7678f844c-5d5tm" May 15 09:20:02.641694 systemd[1]: Created slice kubepods-besteffort-pod9b69ea71_1e9c_4b4c_8f58_988ec3d23797.slice. May 15 09:20:02.676234 kubelet[1952]: I0515 09:20:02.676183 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9b69ea71-1e9c-4b4c-8f58-988ec3d23797-lib-modules\") pod \"calico-node-bczxv\" (UID: \"9b69ea71-1e9c-4b4c-8f58-988ec3d23797\") " pod="calico-system/calico-node-bczxv" May 15 09:20:02.676505 kubelet[1952]: I0515 09:20:02.676485 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/9b69ea71-1e9c-4b4c-8f58-988ec3d23797-var-run-calico\") pod \"calico-node-bczxv\" (UID: \"9b69ea71-1e9c-4b4c-8f58-988ec3d23797\") " pod="calico-system/calico-node-bczxv" May 15 09:20:02.676684 kubelet[1952]: I0515 09:20:02.676643 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/9b69ea71-1e9c-4b4c-8f58-988ec3d23797-cni-bin-dir\") pod \"calico-node-bczxv\" (UID: \"9b69ea71-1e9c-4b4c-8f58-988ec3d23797\") " pod="calico-system/calico-node-bczxv" May 15 09:20:02.676833 kubelet[1952]: I0515 09:20:02.676814 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kr8fs\" (UniqueName: \"kubernetes.io/projected/9b69ea71-1e9c-4b4c-8f58-988ec3d23797-kube-api-access-kr8fs\") pod \"calico-node-bczxv\" (UID: \"9b69ea71-1e9c-4b4c-8f58-988ec3d23797\") " pod="calico-system/calico-node-bczxv" May 15 09:20:02.676957 kubelet[1952]: I0515 09:20:02.676940 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9b69ea71-1e9c-4b4c-8f58-988ec3d23797-tigera-ca-bundle\") pod \"calico-node-bczxv\" (UID: \"9b69ea71-1e9c-4b4c-8f58-988ec3d23797\") " pod="calico-system/calico-node-bczxv" May 15 09:20:02.677096 kubelet[1952]: I0515 09:20:02.677079 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/9b69ea71-1e9c-4b4c-8f58-988ec3d23797-cni-log-dir\") pod \"calico-node-bczxv\" (UID: \"9b69ea71-1e9c-4b4c-8f58-988ec3d23797\") " pod="calico-system/calico-node-bczxv" May 15 09:20:02.677229 kubelet[1952]: I0515 09:20:02.677213 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/9b69ea71-1e9c-4b4c-8f58-988ec3d23797-node-certs\") pod \"calico-node-bczxv\" (UID: \"9b69ea71-1e9c-4b4c-8f58-988ec3d23797\") " pod="calico-system/calico-node-bczxv" May 15 09:20:02.677348 kubelet[1952]: I0515 09:20:02.677332 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/9b69ea71-1e9c-4b4c-8f58-988ec3d23797-cni-net-dir\") pod \"calico-node-bczxv\" (UID: \"9b69ea71-1e9c-4b4c-8f58-988ec3d23797\") " pod="calico-system/calico-node-bczxv" May 15 09:20:02.677470 kubelet[1952]: I0515 09:20:02.677455 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9b69ea71-1e9c-4b4c-8f58-988ec3d23797-xtables-lock\") pod \"calico-node-bczxv\" (UID: \"9b69ea71-1e9c-4b4c-8f58-988ec3d23797\") " pod="calico-system/calico-node-bczxv" May 15 09:20:02.677624 kubelet[1952]: I0515 09:20:02.677593 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/9b69ea71-1e9c-4b4c-8f58-988ec3d23797-policysync\") pod \"calico-node-bczxv\" (UID: \"9b69ea71-1e9c-4b4c-8f58-988ec3d23797\") " pod="calico-system/calico-node-bczxv" May 15 09:20:02.677810 kubelet[1952]: I0515 09:20:02.677780 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9b69ea71-1e9c-4b4c-8f58-988ec3d23797-var-lib-calico\") pod \"calico-node-bczxv\" (UID: \"9b69ea71-1e9c-4b4c-8f58-988ec3d23797\") " pod="calico-system/calico-node-bczxv" May 15 09:20:02.677940 kubelet[1952]: I0515 09:20:02.677922 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/9b69ea71-1e9c-4b4c-8f58-988ec3d23797-flexvol-driver-host\") pod \"calico-node-bczxv\" (UID: \"9b69ea71-1e9c-4b4c-8f58-988ec3d23797\") " pod="calico-system/calico-node-bczxv" May 15 09:20:02.771019 env[1156]: time="2025-05-15T09:20:02.770818694Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7678f844c-5d5tm,Uid:e10da218-00a1-4af4-b312-7cc557c633bf,Namespace:calico-system,Attempt:0,}" May 15 09:20:02.783518 kubelet[1952]: E0515 09:20:02.782167 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.783518 kubelet[1952]: W0515 09:20:02.782270 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.783518 kubelet[1952]: E0515 09:20:02.783020 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.793055 kubelet[1952]: E0515 09:20:02.793014 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.793055 kubelet[1952]: W0515 09:20:02.793045 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.793349 kubelet[1952]: E0515 09:20:02.793069 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.796084 kubelet[1952]: E0515 09:20:02.795998 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gnt2w" podUID="ca20f477-1f70-4715-974d-aef8a8817c3d" May 15 09:20:02.833304 env[1156]: time="2025-05-15T09:20:02.833115767Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 09:20:02.833546 env[1156]: time="2025-05-15T09:20:02.833326214Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 09:20:02.833546 env[1156]: time="2025-05-15T09:20:02.833412366Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 09:20:02.840061 env[1156]: time="2025-05-15T09:20:02.833882543Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/90745786c7c1df7cfcf5b8a7fa9d58b5131022b637836f5d9f70cf0e01995782 pid=2328 runtime=io.containerd.runc.v2 May 15 09:20:02.853520 kubelet[1952]: E0515 09:20:02.853408 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.853520 kubelet[1952]: W0515 09:20:02.853434 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.853520 kubelet[1952]: E0515 09:20:02.853479 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.864654 kubelet[1952]: E0515 09:20:02.864405 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.864654 kubelet[1952]: W0515 09:20:02.864437 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.864654 kubelet[1952]: E0515 09:20:02.864459 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.865356 kubelet[1952]: E0515 09:20:02.865117 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.865356 kubelet[1952]: W0515 09:20:02.865164 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.865356 kubelet[1952]: E0515 09:20:02.865184 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.866044 kubelet[1952]: E0515 09:20:02.865793 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.866044 kubelet[1952]: W0515 09:20:02.865846 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.866044 kubelet[1952]: E0515 09:20:02.865867 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.868790 kubelet[1952]: E0515 09:20:02.866421 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.868790 kubelet[1952]: W0515 09:20:02.866441 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.868790 kubelet[1952]: E0515 09:20:02.866460 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.869574 kubelet[1952]: E0515 09:20:02.869280 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.869574 kubelet[1952]: W0515 09:20:02.869307 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.869574 kubelet[1952]: E0515 09:20:02.869360 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.870092 kubelet[1952]: E0515 09:20:02.869926 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.870092 kubelet[1952]: W0515 09:20:02.869950 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.870092 kubelet[1952]: E0515 09:20:02.869969 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.870651 kubelet[1952]: E0515 09:20:02.870626 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.870808 kubelet[1952]: W0515 09:20:02.870782 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.870928 kubelet[1952]: E0515 09:20:02.870906 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.874820 kubelet[1952]: E0515 09:20:02.874770 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.875040 kubelet[1952]: W0515 09:20:02.875014 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.875209 kubelet[1952]: E0515 09:20:02.875180 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.876204 kubelet[1952]: E0515 09:20:02.875701 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.876204 kubelet[1952]: W0515 09:20:02.875718 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.876204 kubelet[1952]: E0515 09:20:02.875739 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.876204 kubelet[1952]: E0515 09:20:02.876074 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.876204 kubelet[1952]: W0515 09:20:02.876091 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.876204 kubelet[1952]: E0515 09:20:02.876108 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.878798 kubelet[1952]: E0515 09:20:02.878768 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.878941 kubelet[1952]: W0515 09:20:02.878916 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.879030 kubelet[1952]: E0515 09:20:02.879015 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.879375 kubelet[1952]: E0515 09:20:02.879355 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.879495 kubelet[1952]: W0515 09:20:02.879474 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.879643 kubelet[1952]: E0515 09:20:02.879627 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.879906 kubelet[1952]: E0515 09:20:02.879894 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.879995 kubelet[1952]: W0515 09:20:02.879981 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.880066 kubelet[1952]: E0515 09:20:02.880054 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.883674 kubelet[1952]: E0515 09:20:02.883631 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.883844 kubelet[1952]: W0515 09:20:02.883827 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.883947 kubelet[1952]: E0515 09:20:02.883931 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.884475 kubelet[1952]: E0515 09:20:02.884180 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.884475 kubelet[1952]: W0515 09:20:02.884194 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.884475 kubelet[1952]: E0515 09:20:02.884205 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.884475 kubelet[1952]: E0515 09:20:02.884348 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.884475 kubelet[1952]: W0515 09:20:02.884357 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.884475 kubelet[1952]: E0515 09:20:02.884367 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.885146 kubelet[1952]: E0515 09:20:02.884812 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.885146 kubelet[1952]: W0515 09:20:02.884824 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.885146 kubelet[1952]: E0515 09:20:02.884838 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.885146 kubelet[1952]: E0515 09:20:02.885011 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.885146 kubelet[1952]: W0515 09:20:02.885021 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.885146 kubelet[1952]: E0515 09:20:02.885030 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.885514 kubelet[1952]: E0515 09:20:02.885412 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.885514 kubelet[1952]: W0515 09:20:02.885425 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.885514 kubelet[1952]: E0515 09:20:02.885436 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.887834 kubelet[1952]: E0515 09:20:02.887819 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.887939 kubelet[1952]: W0515 09:20:02.887922 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.888060 kubelet[1952]: E0515 09:20:02.888029 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.888666 kubelet[1952]: E0515 09:20:02.888651 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.888766 kubelet[1952]: W0515 09:20:02.888751 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.888852 kubelet[1952]: E0515 09:20:02.888837 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.888961 kubelet[1952]: I0515 09:20:02.888937 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ca20f477-1f70-4715-974d-aef8a8817c3d-varrun\") pod \"csi-node-driver-gnt2w\" (UID: \"ca20f477-1f70-4715-974d-aef8a8817c3d\") " pod="calico-system/csi-node-driver-gnt2w" May 15 09:20:02.889553 kubelet[1952]: E0515 09:20:02.889249 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.889553 kubelet[1952]: W0515 09:20:02.889282 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.889553 kubelet[1952]: E0515 09:20:02.889311 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.889553 kubelet[1952]: E0515 09:20:02.889468 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.889553 kubelet[1952]: W0515 09:20:02.889478 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.889553 kubelet[1952]: E0515 09:20:02.889489 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.889817 kubelet[1952]: E0515 09:20:02.889679 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.889817 kubelet[1952]: W0515 09:20:02.889689 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.889817 kubelet[1952]: E0515 09:20:02.889699 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.889817 kubelet[1952]: I0515 09:20:02.889725 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ca20f477-1f70-4715-974d-aef8a8817c3d-kubelet-dir\") pod \"csi-node-driver-gnt2w\" (UID: \"ca20f477-1f70-4715-974d-aef8a8817c3d\") " pod="calico-system/csi-node-driver-gnt2w" May 15 09:20:02.890000 kubelet[1952]: E0515 09:20:02.889878 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.890000 kubelet[1952]: W0515 09:20:02.889890 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.890000 kubelet[1952]: E0515 09:20:02.889900 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.890000 kubelet[1952]: I0515 09:20:02.889916 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ca20f477-1f70-4715-974d-aef8a8817c3d-socket-dir\") pod \"csi-node-driver-gnt2w\" (UID: \"ca20f477-1f70-4715-974d-aef8a8817c3d\") " pod="calico-system/csi-node-driver-gnt2w" May 15 09:20:02.890151 kubelet[1952]: E0515 09:20:02.890068 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.890151 kubelet[1952]: W0515 09:20:02.890079 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.890151 kubelet[1952]: E0515 09:20:02.890089 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.890151 kubelet[1952]: I0515 09:20:02.890106 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ca20f477-1f70-4715-974d-aef8a8817c3d-registration-dir\") pod \"csi-node-driver-gnt2w\" (UID: \"ca20f477-1f70-4715-974d-aef8a8817c3d\") " pod="calico-system/csi-node-driver-gnt2w" May 15 09:20:02.890318 kubelet[1952]: E0515 09:20:02.890261 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.890318 kubelet[1952]: W0515 09:20:02.890272 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.890318 kubelet[1952]: E0515 09:20:02.890281 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.890318 kubelet[1952]: I0515 09:20:02.890299 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fj788\" (UniqueName: \"kubernetes.io/projected/ca20f477-1f70-4715-974d-aef8a8817c3d-kube-api-access-fj788\") pod \"csi-node-driver-gnt2w\" (UID: \"ca20f477-1f70-4715-974d-aef8a8817c3d\") " pod="calico-system/csi-node-driver-gnt2w" May 15 09:20:02.890599 kubelet[1952]: E0515 09:20:02.890457 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.890599 kubelet[1952]: W0515 09:20:02.890476 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.890599 kubelet[1952]: E0515 09:20:02.890486 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.890933 kubelet[1952]: E0515 09:20:02.890808 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.890933 kubelet[1952]: W0515 09:20:02.890823 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.890933 kubelet[1952]: E0515 09:20:02.890844 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.891174 kubelet[1952]: E0515 09:20:02.891161 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.891297 kubelet[1952]: W0515 09:20:02.891280 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.891471 kubelet[1952]: E0515 09:20:02.891398 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.893959 kubelet[1952]: E0515 09:20:02.893942 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.894086 kubelet[1952]: W0515 09:20:02.894070 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.894163 kubelet[1952]: E0515 09:20:02.894149 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.894484 kubelet[1952]: E0515 09:20:02.894471 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.894637 kubelet[1952]: W0515 09:20:02.894612 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.894793 kubelet[1952]: E0515 09:20:02.894767 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.895131 kubelet[1952]: E0515 09:20:02.895093 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.895131 kubelet[1952]: W0515 09:20:02.895124 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.895310 kubelet[1952]: E0515 09:20:02.895151 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.895423 kubelet[1952]: E0515 09:20:02.895394 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.895423 kubelet[1952]: W0515 09:20:02.895414 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.895592 kubelet[1952]: E0515 09:20:02.895431 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.895812 kubelet[1952]: E0515 09:20:02.895696 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.895812 kubelet[1952]: W0515 09:20:02.895715 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.895812 kubelet[1952]: E0515 09:20:02.895730 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.930976 systemd[1]: Started cri-containerd-90745786c7c1df7cfcf5b8a7fa9d58b5131022b637836f5d9f70cf0e01995782.scope. May 15 09:20:02.944614 env[1156]: time="2025-05-15T09:20:02.944556950Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-bczxv,Uid:9b69ea71-1e9c-4b4c-8f58-988ec3d23797,Namespace:calico-system,Attempt:0,}" May 15 09:20:02.992549 kubelet[1952]: E0515 09:20:02.991917 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.992549 kubelet[1952]: W0515 09:20:02.992005 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.992549 kubelet[1952]: E0515 09:20:02.992096 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.992549 kubelet[1952]: E0515 09:20:02.992423 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.992549 kubelet[1952]: W0515 09:20:02.992433 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.992549 kubelet[1952]: E0515 09:20:02.992450 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.992915 kubelet[1952]: E0515 09:20:02.992747 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.992915 kubelet[1952]: W0515 09:20:02.992771 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.992915 kubelet[1952]: E0515 09:20:02.992797 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.993174 kubelet[1952]: E0515 09:20:02.993155 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.993174 kubelet[1952]: W0515 09:20:02.993170 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.993282 kubelet[1952]: E0515 09:20:02.993187 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.993374 kubelet[1952]: E0515 09:20:02.993356 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.993374 kubelet[1952]: W0515 09:20:02.993370 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.993473 kubelet[1952]: E0515 09:20:02.993385 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.994556 kubelet[1952]: E0515 09:20:02.993731 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.994556 kubelet[1952]: W0515 09:20:02.993745 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.997558 kubelet[1952]: E0515 09:20:02.994715 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.997558 kubelet[1952]: E0515 09:20:02.994969 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.997558 kubelet[1952]: W0515 09:20:02.994980 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.997558 kubelet[1952]: E0515 09:20:02.995155 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.997558 kubelet[1952]: W0515 09:20:02.995164 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.997558 kubelet[1952]: E0515 09:20:02.995174 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.997558 kubelet[1952]: E0515 09:20:02.995332 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.997558 kubelet[1952]: W0515 09:20:02.995340 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.997558 kubelet[1952]: E0515 09:20:02.995350 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.997558 kubelet[1952]: E0515 09:20:02.995488 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.998110 kubelet[1952]: W0515 09:20:02.995497 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.998110 kubelet[1952]: E0515 09:20:02.995506 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.998110 kubelet[1952]: E0515 09:20:02.995717 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.998110 kubelet[1952]: W0515 09:20:02.995726 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.998110 kubelet[1952]: E0515 09:20:02.995735 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.998110 kubelet[1952]: E0515 09:20:02.995760 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.998110 kubelet[1952]: E0515 09:20:02.995930 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.998110 kubelet[1952]: W0515 09:20:02.995939 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.998110 kubelet[1952]: E0515 09:20:02.995948 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.998110 kubelet[1952]: E0515 09:20:02.996104 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.998431 kubelet[1952]: W0515 09:20:02.996113 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.998431 kubelet[1952]: E0515 09:20:02.996123 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.998431 kubelet[1952]: E0515 09:20:02.996281 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.998431 kubelet[1952]: W0515 09:20:02.996290 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.998431 kubelet[1952]: E0515 09:20:02.996299 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.998431 kubelet[1952]: E0515 09:20:02.996445 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.998431 kubelet[1952]: W0515 09:20:02.996454 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.998431 kubelet[1952]: E0515 09:20:02.996464 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.998431 kubelet[1952]: E0515 09:20:02.996621 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.998431 kubelet[1952]: W0515 09:20:02.996630 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.999159 kubelet[1952]: E0515 09:20:02.996641 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.999159 kubelet[1952]: E0515 09:20:02.996847 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.999159 kubelet[1952]: W0515 09:20:02.996856 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.999159 kubelet[1952]: E0515 09:20:02.996865 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.999159 kubelet[1952]: E0515 09:20:02.997338 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.999159 kubelet[1952]: W0515 09:20:02.997369 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.999159 kubelet[1952]: E0515 09:20:02.997387 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:02.999159 kubelet[1952]: E0515 09:20:02.998664 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:02.999159 kubelet[1952]: W0515 09:20:02.998679 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:02.999159 kubelet[1952]: E0515 09:20:02.998704 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:03.000107 kubelet[1952]: E0515 09:20:02.999636 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:03.000107 kubelet[1952]: W0515 09:20:02.999649 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:03.000107 kubelet[1952]: E0515 09:20:02.999941 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:03.000107 kubelet[1952]: W0515 09:20:02.999966 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:03.000107 kubelet[1952]: E0515 09:20:02.999979 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:03.005082 kubelet[1952]: E0515 09:20:03.002564 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:03.005266 env[1156]: time="2025-05-15T09:20:03.003375783Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 09:20:03.005266 env[1156]: time="2025-05-15T09:20:03.003484448Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 09:20:03.005266 env[1156]: time="2025-05-15T09:20:03.003520676Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 09:20:03.005807 kubelet[1952]: E0515 09:20:03.005588 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:03.005807 kubelet[1952]: W0515 09:20:03.005612 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:03.005807 kubelet[1952]: E0515 09:20:03.005653 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:03.006392 env[1156]: time="2025-05-15T09:20:03.006301119Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ee1b49521f06cbf6d2ef00593d9408251ca2b8bca903d7248c38ffad16988240 pid=2397 runtime=io.containerd.runc.v2 May 15 09:20:03.007147 kubelet[1952]: E0515 09:20:03.006570 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:03.007147 kubelet[1952]: W0515 09:20:03.006586 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:03.007147 kubelet[1952]: E0515 09:20:03.006744 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:03.007147 kubelet[1952]: E0515 09:20:03.006875 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:03.007147 kubelet[1952]: W0515 09:20:03.006884 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:03.007147 kubelet[1952]: E0515 09:20:03.006920 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:03.010413 kubelet[1952]: E0515 09:20:03.007496 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:03.010689 kubelet[1952]: W0515 09:20:03.007539 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:03.010836 kubelet[1952]: E0515 09:20:03.010815 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:03.014380 kubelet[1952]: E0515 09:20:03.014343 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 09:20:03.014592 kubelet[1952]: W0515 09:20:03.014574 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 09:20:03.014694 kubelet[1952]: E0515 09:20:03.014680 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 09:20:03.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.054000 audit: BPF prog-id=115 op=LOAD May 15 09:20:03.046399 systemd[1]: Started cri-containerd-ee1b49521f06cbf6d2ef00593d9408251ca2b8bca903d7248c38ffad16988240.scope. May 15 09:20:03.059000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.059000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2328 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:03.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930373435373836633763316466376366636635623861376661396435 May 15 09:20:03.059000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.059000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2328 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:03.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930373435373836633763316466376366636635623861376661396435 May 15 09:20:03.059000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.059000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.059000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.059000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.059000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.059000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.059000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.059000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.059000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.059000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.059000 audit: BPF prog-id=116 op=LOAD May 15 09:20:03.059000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0003de0a0 items=0 ppid=2328 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:03.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930373435373836633763316466376366636635623861376661396435 May 15 09:20:03.059000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.059000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.059000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.059000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.059000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.059000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.059000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.059000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.059000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.059000 audit: BPF prog-id=117 op=LOAD May 15 09:20:03.059000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0003de0e8 items=0 ppid=2328 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:03.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930373435373836633763316466376366636635623861376661396435 May 15 09:20:03.060000 audit: BPF prog-id=117 op=UNLOAD May 15 09:20:03.060000 audit: BPF prog-id=116 op=UNLOAD May 15 09:20:03.060000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.060000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.060000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.060000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.060000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.060000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.060000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.060000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.060000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.060000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.060000 audit: BPF prog-id=118 op=LOAD May 15 09:20:03.060000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003de4f8 items=0 ppid=2328 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:03.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930373435373836633763316466376366636635623861376661396435 May 15 09:20:03.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.101000 audit: BPF prog-id=119 op=LOAD May 15 09:20:03.103000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.103000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2397 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:03.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565316234393532316630366362663664326566303035393364393430 May 15 09:20:03.103000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.103000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2397 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:03.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565316234393532316630366362663664326566303035393364393430 May 15 09:20:03.104000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.104000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.104000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.104000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.104000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.104000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.104000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.104000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.104000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.104000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.104000 audit: BPF prog-id=120 op=LOAD May 15 09:20:03.104000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00033e1b0 items=0 ppid=2397 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:03.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565316234393532316630366362663664326566303035393364393430 May 15 09:20:03.105000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.105000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.105000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.105000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.105000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.105000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.105000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.105000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.105000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.105000 audit: BPF prog-id=121 op=LOAD May 15 09:20:03.105000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00033e1f8 items=0 ppid=2397 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:03.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565316234393532316630366362663664326566303035393364393430 May 15 09:20:03.106000 audit: BPF prog-id=121 op=UNLOAD May 15 09:20:03.106000 audit: BPF prog-id=120 op=UNLOAD May 15 09:20:03.106000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.106000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.106000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.106000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.106000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.106000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.106000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.106000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.106000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.106000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:03.106000 audit: BPF prog-id=122 op=LOAD May 15 09:20:03.106000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00033e608 items=0 ppid=2397 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:03.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565316234393532316630366362663664326566303035393364393430 May 15 09:20:03.159210 env[1156]: time="2025-05-15T09:20:03.159094689Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-bczxv,Uid:9b69ea71-1e9c-4b4c-8f58-988ec3d23797,Namespace:calico-system,Attempt:0,} returns sandbox id \"ee1b49521f06cbf6d2ef00593d9408251ca2b8bca903d7248c38ffad16988240\"" May 15 09:20:03.161658 env[1156]: time="2025-05-15T09:20:03.161620191Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 15 09:20:03.187720 env[1156]: time="2025-05-15T09:20:03.187648545Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7678f844c-5d5tm,Uid:e10da218-00a1-4af4-b312-7cc557c633bf,Namespace:calico-system,Attempt:0,} returns sandbox id \"90745786c7c1df7cfcf5b8a7fa9d58b5131022b637836f5d9f70cf0e01995782\"" May 15 09:20:03.332000 audit[2464]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:20:03.332000 audit[2464]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffd43d94c20 a2=0 a3=7ffd43d94c0c items=0 ppid=2126 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:03.332000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:20:03.337000 audit[2464]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:20:03.337000 audit[2464]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd43d94c20 a2=0 a3=0 items=0 ppid=2126 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:03.337000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:20:05.168792 kubelet[1952]: E0515 09:20:05.168514 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gnt2w" podUID="ca20f477-1f70-4715-974d-aef8a8817c3d" May 15 09:20:05.416277 env[1156]: time="2025-05-15T09:20:05.416207212Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:05.419828 env[1156]: time="2025-05-15T09:20:05.419204090Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:05.421715 env[1156]: time="2025-05-15T09:20:05.421632057Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:05.424066 env[1156]: time="2025-05-15T09:20:05.424010189Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:05.425764 env[1156]: time="2025-05-15T09:20:05.425617630Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 15 09:20:05.431495 env[1156]: time="2025-05-15T09:20:05.429393667Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 15 09:20:05.443114 env[1156]: time="2025-05-15T09:20:05.443038727Z" level=info msg="CreateContainer within sandbox \"ee1b49521f06cbf6d2ef00593d9408251ca2b8bca903d7248c38ffad16988240\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 09:20:05.474257 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1706429540.mount: Deactivated successfully. May 15 09:20:05.487587 env[1156]: time="2025-05-15T09:20:05.487333409Z" level=info msg="CreateContainer within sandbox \"ee1b49521f06cbf6d2ef00593d9408251ca2b8bca903d7248c38ffad16988240\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"5c7d41298487f8eba2027ac55a2eb998908a81cc8a3e12a9189469c3b0239ab3\"" May 15 09:20:05.488841 env[1156]: time="2025-05-15T09:20:05.488801256Z" level=info msg="StartContainer for \"5c7d41298487f8eba2027ac55a2eb998908a81cc8a3e12a9189469c3b0239ab3\"" May 15 09:20:05.543289 systemd[1]: Started cri-containerd-5c7d41298487f8eba2027ac55a2eb998908a81cc8a3e12a9189469c3b0239ab3.scope. May 15 09:20:05.562000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f4fc4a102f8 items=0 ppid=2397 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:05.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563376434313239383438376638656261323032376163353561326562 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit: BPF prog-id=123 op=LOAD May 15 09:20:05.562000 audit[2473]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0000246c8 items=0 ppid=2397 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:05.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563376434313239383438376638656261323032376163353561326562 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit: BPF prog-id=124 op=LOAD May 15 09:20:05.562000 audit[2473]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024718 items=0 ppid=2397 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:05.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563376434313239383438376638656261323032376163353561326562 May 15 09:20:05.562000 audit: BPF prog-id=124 op=UNLOAD May 15 09:20:05.562000 audit: BPF prog-id=123 op=UNLOAD May 15 09:20:05.562000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:05.562000 audit: BPF prog-id=125 op=LOAD May 15 09:20:05.562000 audit[2473]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0000247a8 items=0 ppid=2397 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:05.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563376434313239383438376638656261323032376163353561326562 May 15 09:20:05.600752 env[1156]: time="2025-05-15T09:20:05.600684656Z" level=info msg="StartContainer for \"5c7d41298487f8eba2027ac55a2eb998908a81cc8a3e12a9189469c3b0239ab3\" returns successfully" May 15 09:20:05.615505 systemd[1]: cri-containerd-5c7d41298487f8eba2027ac55a2eb998908a81cc8a3e12a9189469c3b0239ab3.scope: Deactivated successfully. May 15 09:20:05.619000 audit: BPF prog-id=125 op=UNLOAD May 15 09:20:06.171454 env[1156]: time="2025-05-15T09:20:06.171330615Z" level=info msg="shim disconnected" id=5c7d41298487f8eba2027ac55a2eb998908a81cc8a3e12a9189469c3b0239ab3 May 15 09:20:06.172291 env[1156]: time="2025-05-15T09:20:06.172238646Z" level=warning msg="cleaning up after shim disconnected" id=5c7d41298487f8eba2027ac55a2eb998908a81cc8a3e12a9189469c3b0239ab3 namespace=k8s.io May 15 09:20:06.172498 env[1156]: time="2025-05-15T09:20:06.172458451Z" level=info msg="cleaning up dead shim" May 15 09:20:06.195624 env[1156]: time="2025-05-15T09:20:06.195392694Z" level=warning msg="cleanup warnings time=\"2025-05-15T09:20:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2510 runtime=io.containerd.runc.v2\n" May 15 09:20:06.473619 systemd[1]: run-containerd-runc-k8s.io-5c7d41298487f8eba2027ac55a2eb998908a81cc8a3e12a9189469c3b0239ab3-runc.yWgBFh.mount: Deactivated successfully. May 15 09:20:06.474809 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5c7d41298487f8eba2027ac55a2eb998908a81cc8a3e12a9189469c3b0239ab3-rootfs.mount: Deactivated successfully. May 15 09:20:07.167950 kubelet[1952]: E0515 09:20:07.167859 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gnt2w" podUID="ca20f477-1f70-4715-974d-aef8a8817c3d" May 15 09:20:09.168820 kubelet[1952]: E0515 09:20:09.168450 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gnt2w" podUID="ca20f477-1f70-4715-974d-aef8a8817c3d" May 15 09:20:09.548541 env[1156]: time="2025-05-15T09:20:09.547961334Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:09.552600 env[1156]: time="2025-05-15T09:20:09.552566831Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:09.556125 env[1156]: time="2025-05-15T09:20:09.556101270Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:09.559076 env[1156]: time="2025-05-15T09:20:09.559050276Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:09.559915 env[1156]: time="2025-05-15T09:20:09.559865010Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 15 09:20:09.564948 env[1156]: time="2025-05-15T09:20:09.564891340Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 15 09:20:09.593843 env[1156]: time="2025-05-15T09:20:09.589669622Z" level=info msg="CreateContainer within sandbox \"90745786c7c1df7cfcf5b8a7fa9d58b5131022b637836f5d9f70cf0e01995782\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 15 09:20:09.633585 env[1156]: time="2025-05-15T09:20:09.633356759Z" level=info msg="CreateContainer within sandbox \"90745786c7c1df7cfcf5b8a7fa9d58b5131022b637836f5d9f70cf0e01995782\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"400e18e165b83f580089e0b32a150a647a75f8de03b92a8df54574844be48234\"" May 15 09:20:09.635568 env[1156]: time="2025-05-15T09:20:09.634665905Z" level=info msg="StartContainer for \"400e18e165b83f580089e0b32a150a647a75f8de03b92a8df54574844be48234\"" May 15 09:20:09.692759 systemd[1]: Started cri-containerd-400e18e165b83f580089e0b32a150a647a75f8de03b92a8df54574844be48234.scope. May 15 09:20:09.715415 kernel: kauditd_printk_skb: 166 callbacks suppressed May 15 09:20:09.715701 kernel: audit: type=1400 audit(1747300809.707:988): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.725616 kernel: audit: type=1400 audit(1747300809.707:989): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.725903 kernel: audit: type=1400 audit(1747300809.707:990): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.725964 kernel: audit: type=1400 audit(1747300809.707:991): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.730722 kernel: audit: type=1400 audit(1747300809.707:992): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.735514 kernel: audit: type=1400 audit(1747300809.707:993): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.745135 kernel: audit: type=1400 audit(1747300809.707:994): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.750032 kernel: audit: type=1400 audit(1747300809.707:995): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.750133 kernel: audit: type=1400 audit(1747300809.707:996): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.759813 kernel: audit: type=1400 audit(1747300809.708:997): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.708000 audit: BPF prog-id=126 op=LOAD May 15 09:20:09.709000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.709000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2328 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:09.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306531386531363562383366353830303839653062333261313530 May 15 09:20:09.709000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.709000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2328 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:09.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306531386531363562383366353830303839653062333261313530 May 15 09:20:09.709000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.709000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.709000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.709000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.709000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.709000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.709000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.709000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.709000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.709000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.709000 audit: BPF prog-id=127 op=LOAD May 15 09:20:09.709000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00027ad60 items=0 ppid=2328 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:09.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306531386531363562383366353830303839653062333261313530 May 15 09:20:09.714000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.714000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.714000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.714000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.714000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.714000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.714000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.714000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.714000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.714000 audit: BPF prog-id=128 op=LOAD May 15 09:20:09.714000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00027ada8 items=0 ppid=2328 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:09.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306531386531363562383366353830303839653062333261313530 May 15 09:20:09.715000 audit: BPF prog-id=128 op=UNLOAD May 15 09:20:09.715000 audit: BPF prog-id=127 op=UNLOAD May 15 09:20:09.715000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.715000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.715000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.715000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.715000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.715000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.715000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.715000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.715000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.715000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:09.715000 audit: BPF prog-id=129 op=LOAD May 15 09:20:09.715000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00027b1b8 items=0 ppid=2328 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:09.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306531386531363562383366353830303839653062333261313530 May 15 09:20:09.781031 env[1156]: time="2025-05-15T09:20:09.780983608Z" level=info msg="StartContainer for \"400e18e165b83f580089e0b32a150a647a75f8de03b92a8df54574844be48234\" returns successfully" May 15 09:20:10.408855 kubelet[1952]: I0515 09:20:10.408671 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-7678f844c-5d5tm" podStartSLOduration=2.036346807 podStartE2EDuration="8.408576624s" podCreationTimestamp="2025-05-15 09:20:02 +0000 UTC" firstStartedPulling="2025-05-15 09:20:03.190831015 +0000 UTC m=+15.161424986" lastFinishedPulling="2025-05-15 09:20:09.563060832 +0000 UTC m=+21.533654803" observedRunningTime="2025-05-15 09:20:10.378917683 +0000 UTC m=+22.349511705" watchObservedRunningTime="2025-05-15 09:20:10.408576624 +0000 UTC m=+22.379170646" May 15 09:20:10.453000 audit[2570]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2570 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:20:10.453000 audit[2570]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdf0b9ae20 a2=0 a3=7ffdf0b9ae0c items=0 ppid=2126 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:10.453000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:20:10.461000 audit[2570]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2570 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:20:10.461000 audit[2570]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffdf0b9ae20 a2=0 a3=7ffdf0b9ae0c items=0 ppid=2126 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:10.461000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:20:11.170775 kubelet[1952]: E0515 09:20:11.169400 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gnt2w" podUID="ca20f477-1f70-4715-974d-aef8a8817c3d" May 15 09:20:13.168337 kubelet[1952]: E0515 09:20:13.168205 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gnt2w" podUID="ca20f477-1f70-4715-974d-aef8a8817c3d" May 15 09:20:15.168726 kubelet[1952]: E0515 09:20:15.168270 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gnt2w" podUID="ca20f477-1f70-4715-974d-aef8a8817c3d" May 15 09:20:17.167893 kubelet[1952]: E0515 09:20:17.167786 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gnt2w" podUID="ca20f477-1f70-4715-974d-aef8a8817c3d" May 15 09:20:17.737698 env[1156]: time="2025-05-15T09:20:17.737346555Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:17.742773 env[1156]: time="2025-05-15T09:20:17.742695946Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:17.748025 env[1156]: time="2025-05-15T09:20:17.747949184Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:17.752747 env[1156]: time="2025-05-15T09:20:17.752672746Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:17.754444 env[1156]: time="2025-05-15T09:20:17.754334344Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 15 09:20:17.770406 env[1156]: time="2025-05-15T09:20:17.770204790Z" level=info msg="CreateContainer within sandbox \"ee1b49521f06cbf6d2ef00593d9408251ca2b8bca903d7248c38ffad16988240\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 09:20:17.825332 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3562938625.mount: Deactivated successfully. May 15 09:20:17.836934 env[1156]: time="2025-05-15T09:20:17.836824780Z" level=info msg="CreateContainer within sandbox \"ee1b49521f06cbf6d2ef00593d9408251ca2b8bca903d7248c38ffad16988240\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"3dbdd68df05402b682efee9e28696f744ea2867e782630a529f627b16541f6a6\"" May 15 09:20:17.838186 env[1156]: time="2025-05-15T09:20:17.838132902Z" level=info msg="StartContainer for \"3dbdd68df05402b682efee9e28696f744ea2867e782630a529f627b16541f6a6\"" May 15 09:20:17.881377 systemd[1]: Started cri-containerd-3dbdd68df05402b682efee9e28696f744ea2867e782630a529f627b16541f6a6.scope. May 15 09:20:17.907508 kernel: kauditd_printk_skb: 53 callbacks suppressed May 15 09:20:17.907747 kernel: audit: type=1400 audit(1747300817.900:1008): avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.900000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.900000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1467dce2f8 items=0 ppid=2397 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:17.916858 kernel: audit: type=1300 audit(1747300817.900:1008): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1467dce2f8 items=0 ppid=2397 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:17.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364626464363864663035343032623638326566656539653238363936 May 15 09:20:17.929105 kernel: audit: type=1327 audit(1747300817.900:1008): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364626464363864663035343032623638326566656539653238363936 May 15 09:20:17.929185 kernel: audit: type=1400 audit(1747300817.900:1009): avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.900000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.900000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.935555 kernel: audit: type=1400 audit(1747300817.900:1009): avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.900000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.941616 kernel: audit: type=1400 audit(1747300817.900:1009): avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.900000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.949556 kernel: audit: type=1400 audit(1747300817.900:1009): avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.900000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.954626 kernel: audit: type=1400 audit(1747300817.900:1009): avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.954732 kernel: audit: type=1400 audit(1747300817.900:1009): avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.900000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.900000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.966559 kernel: audit: type=1400 audit(1747300817.900:1009): avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.900000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.900000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.900000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.900000 audit: BPF prog-id=130 op=LOAD May 15 09:20:17.900000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024898 items=0 ppid=2397 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:17.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364626464363864663035343032623638326566656539653238363936 May 15 09:20:17.907000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.907000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.907000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.907000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.907000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.907000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.907000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.907000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.907000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.907000 audit: BPF prog-id=131 op=LOAD May 15 09:20:17.907000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0000248e8 items=0 ppid=2397 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:17.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364626464363864663035343032623638326566656539653238363936 May 15 09:20:17.907000 audit: BPF prog-id=131 op=UNLOAD May 15 09:20:17.907000 audit: BPF prog-id=130 op=UNLOAD May 15 09:20:17.907000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.907000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.907000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.907000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.907000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.907000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.907000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.907000 audit[2581]: AVC avc: denied { perfmon } for pid=2581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.907000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.907000 audit[2581]: AVC avc: denied { bpf } for pid=2581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:17.907000 audit: BPF prog-id=132 op=LOAD May 15 09:20:17.907000 audit[2581]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000024978 items=0 ppid=2397 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:17.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364626464363864663035343032623638326566656539653238363936 May 15 09:20:17.972868 env[1156]: time="2025-05-15T09:20:17.972816350Z" level=info msg="StartContainer for \"3dbdd68df05402b682efee9e28696f744ea2867e782630a529f627b16541f6a6\" returns successfully" May 15 09:20:19.167114 kubelet[1952]: E0515 09:20:19.167046 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gnt2w" podUID="ca20f477-1f70-4715-974d-aef8a8817c3d" May 15 09:20:19.378838 env[1156]: time="2025-05-15T09:20:19.378707437Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 09:20:19.382563 systemd[1]: cri-containerd-3dbdd68df05402b682efee9e28696f744ea2867e782630a529f627b16541f6a6.scope: Deactivated successfully. May 15 09:20:19.389000 audit: BPF prog-id=132 op=UNLOAD May 15 09:20:19.411098 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3dbdd68df05402b682efee9e28696f744ea2867e782630a529f627b16541f6a6-rootfs.mount: Deactivated successfully. May 15 09:20:19.443587 kubelet[1952]: I0515 09:20:19.428956 1952 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 15 09:20:19.799991 systemd[1]: Created slice kubepods-burstable-pod58ca787e_dacc_4065_9fb9_bd5f94da9491.slice. May 15 09:20:19.851719 kubelet[1952]: I0515 09:20:19.851620 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kmhmw\" (UniqueName: \"kubernetes.io/projected/58ca787e-dacc-4065-9fb9-bd5f94da9491-kube-api-access-kmhmw\") pod \"coredns-6f6b679f8f-vjn6s\" (UID: \"58ca787e-dacc-4065-9fb9-bd5f94da9491\") " pod="kube-system/coredns-6f6b679f8f-vjn6s" May 15 09:20:19.852626 kubelet[1952]: I0515 09:20:19.852451 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/58ca787e-dacc-4065-9fb9-bd5f94da9491-config-volume\") pod \"coredns-6f6b679f8f-vjn6s\" (UID: \"58ca787e-dacc-4065-9fb9-bd5f94da9491\") " pod="kube-system/coredns-6f6b679f8f-vjn6s" May 15 09:20:20.205767 systemd[1]: Created slice kubepods-besteffort-podb5d0e6bf_a1a0_4752_8f38_d1bf2e0f377c.slice. May 15 09:20:20.241152 systemd[1]: Created slice kubepods-besteffort-podb69c064a_8357_4600_9040_f9f9b30500a0.slice. May 15 09:20:20.247562 systemd[1]: Created slice kubepods-burstable-podb8006dac_3d47_4240_90f3_f7871027a257.slice. May 15 09:20:20.254107 systemd[1]: Created slice kubepods-besteffort-podb6dcb7ec_8083_4d33_a2fd_c905bcb8ed81.slice. May 15 09:20:20.260567 kubelet[1952]: I0515 09:20:20.258454 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xwvdv\" (UniqueName: \"kubernetes.io/projected/b5d0e6bf-a1a0-4752-8f38-d1bf2e0f377c-kube-api-access-xwvdv\") pod \"calico-kube-controllers-6bdc9bc67-wm5x8\" (UID: \"b5d0e6bf-a1a0-4752-8f38-d1bf2e0f377c\") " pod="calico-system/calico-kube-controllers-6bdc9bc67-wm5x8" May 15 09:20:20.260567 kubelet[1952]: I0515 09:20:20.258512 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b5d0e6bf-a1a0-4752-8f38-d1bf2e0f377c-tigera-ca-bundle\") pod \"calico-kube-controllers-6bdc9bc67-wm5x8\" (UID: \"b5d0e6bf-a1a0-4752-8f38-d1bf2e0f377c\") " pod="calico-system/calico-kube-controllers-6bdc9bc67-wm5x8" May 15 09:20:20.260567 kubelet[1952]: I0515 09:20:20.258562 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/b6dcb7ec-8083-4d33-a2fd-c905bcb8ed81-calico-apiserver-certs\") pod \"calico-apiserver-75fb8c8f64-dsrx7\" (UID: \"b6dcb7ec-8083-4d33-a2fd-c905bcb8ed81\") " pod="calico-apiserver/calico-apiserver-75fb8c8f64-dsrx7" May 15 09:20:20.260567 kubelet[1952]: I0515 09:20:20.258586 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mrczf\" (UniqueName: \"kubernetes.io/projected/b6dcb7ec-8083-4d33-a2fd-c905bcb8ed81-kube-api-access-mrczf\") pod \"calico-apiserver-75fb8c8f64-dsrx7\" (UID: \"b6dcb7ec-8083-4d33-a2fd-c905bcb8ed81\") " pod="calico-apiserver/calico-apiserver-75fb8c8f64-dsrx7" May 15 09:20:20.260567 kubelet[1952]: I0515 09:20:20.258622 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b8006dac-3d47-4240-90f3-f7871027a257-config-volume\") pod \"coredns-6f6b679f8f-nh2z8\" (UID: \"b8006dac-3d47-4240-90f3-f7871027a257\") " pod="kube-system/coredns-6f6b679f8f-nh2z8" May 15 09:20:20.261208 kubelet[1952]: I0515 09:20:20.258648 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/b69c064a-8357-4600-9040-f9f9b30500a0-calico-apiserver-certs\") pod \"calico-apiserver-75fb8c8f64-z6k6g\" (UID: \"b69c064a-8357-4600-9040-f9f9b30500a0\") " pod="calico-apiserver/calico-apiserver-75fb8c8f64-z6k6g" May 15 09:20:20.261208 kubelet[1952]: I0515 09:20:20.258693 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kh9c8\" (UniqueName: \"kubernetes.io/projected/b8006dac-3d47-4240-90f3-f7871027a257-kube-api-access-kh9c8\") pod \"coredns-6f6b679f8f-nh2z8\" (UID: \"b8006dac-3d47-4240-90f3-f7871027a257\") " pod="kube-system/coredns-6f6b679f8f-nh2z8" May 15 09:20:20.261208 kubelet[1952]: I0515 09:20:20.258719 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bjcht\" (UniqueName: \"kubernetes.io/projected/b69c064a-8357-4600-9040-f9f9b30500a0-kube-api-access-bjcht\") pod \"calico-apiserver-75fb8c8f64-z6k6g\" (UID: \"b69c064a-8357-4600-9040-f9f9b30500a0\") " pod="calico-apiserver/calico-apiserver-75fb8c8f64-z6k6g" May 15 09:20:20.412945 env[1156]: time="2025-05-15T09:20:20.411612536Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-vjn6s,Uid:58ca787e-dacc-4065-9fb9-bd5f94da9491,Namespace:kube-system,Attempt:0,}" May 15 09:20:20.545209 env[1156]: time="2025-05-15T09:20:20.545000031Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75fb8c8f64-z6k6g,Uid:b69c064a-8357-4600-9040-f9f9b30500a0,Namespace:calico-apiserver,Attempt:0,}" May 15 09:20:20.551543 env[1156]: time="2025-05-15T09:20:20.551271444Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-nh2z8,Uid:b8006dac-3d47-4240-90f3-f7871027a257,Namespace:kube-system,Attempt:0,}" May 15 09:20:20.557635 env[1156]: time="2025-05-15T09:20:20.557570849Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75fb8c8f64-dsrx7,Uid:b6dcb7ec-8083-4d33-a2fd-c905bcb8ed81,Namespace:calico-apiserver,Attempt:0,}" May 15 09:20:20.652050 env[1156]: time="2025-05-15T09:20:20.651418480Z" level=info msg="shim disconnected" id=3dbdd68df05402b682efee9e28696f744ea2867e782630a529f627b16541f6a6 May 15 09:20:20.652050 env[1156]: time="2025-05-15T09:20:20.651566810Z" level=warning msg="cleaning up after shim disconnected" id=3dbdd68df05402b682efee9e28696f744ea2867e782630a529f627b16541f6a6 namespace=k8s.io May 15 09:20:20.652050 env[1156]: time="2025-05-15T09:20:20.651598108Z" level=info msg="cleaning up dead shim" May 15 09:20:20.708050 env[1156]: time="2025-05-15T09:20:20.707855104Z" level=warning msg="cleanup warnings time=\"2025-05-15T09:20:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2629 runtime=io.containerd.runc.v2\n" May 15 09:20:20.812088 env[1156]: time="2025-05-15T09:20:20.811716049Z" level=error msg="Failed to destroy network for sandbox \"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:20.813169 env[1156]: time="2025-05-15T09:20:20.813108079Z" level=error msg="encountered an error cleaning up failed sandbox \"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:20.814748 env[1156]: time="2025-05-15T09:20:20.814693823Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-nh2z8,Uid:b8006dac-3d47-4240-90f3-f7871027a257,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:20.816092 kubelet[1952]: E0515 09:20:20.815609 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:20.816092 kubelet[1952]: E0515 09:20:20.815826 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-nh2z8" May 15 09:20:20.816092 kubelet[1952]: E0515 09:20:20.815886 1952 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-nh2z8" May 15 09:20:20.816295 kubelet[1952]: E0515 09:20:20.816015 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-nh2z8_kube-system(b8006dac-3d47-4240-90f3-f7871027a257)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-nh2z8_kube-system(b8006dac-3d47-4240-90f3-f7871027a257)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-nh2z8" podUID="b8006dac-3d47-4240-90f3-f7871027a257" May 15 09:20:20.824211 env[1156]: time="2025-05-15T09:20:20.824162934Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bdc9bc67-wm5x8,Uid:b5d0e6bf-a1a0-4752-8f38-d1bf2e0f377c,Namespace:calico-system,Attempt:0,}" May 15 09:20:20.926064 env[1156]: time="2025-05-15T09:20:20.925980545Z" level=error msg="Failed to destroy network for sandbox \"a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:20.926895 env[1156]: time="2025-05-15T09:20:20.926854098Z" level=error msg="encountered an error cleaning up failed sandbox \"a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:20.927198 env[1156]: time="2025-05-15T09:20:20.927147200Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-vjn6s,Uid:58ca787e-dacc-4065-9fb9-bd5f94da9491,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:20.928743 kubelet[1952]: E0515 09:20:20.927546 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:20.928743 kubelet[1952]: E0515 09:20:20.927621 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-vjn6s" May 15 09:20:20.928743 kubelet[1952]: E0515 09:20:20.927671 1952 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-vjn6s" May 15 09:20:20.928935 kubelet[1952]: E0515 09:20:20.927747 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-vjn6s_kube-system(58ca787e-dacc-4065-9fb9-bd5f94da9491)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-vjn6s_kube-system(58ca787e-dacc-4065-9fb9-bd5f94da9491)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-vjn6s" podUID="58ca787e-dacc-4065-9fb9-bd5f94da9491" May 15 09:20:20.938674 env[1156]: time="2025-05-15T09:20:20.938609202Z" level=error msg="Failed to destroy network for sandbox \"3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:20.939258 env[1156]: time="2025-05-15T09:20:20.939222867Z" level=error msg="encountered an error cleaning up failed sandbox \"3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:20.939451 env[1156]: time="2025-05-15T09:20:20.939392386Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75fb8c8f64-z6k6g,Uid:b69c064a-8357-4600-9040-f9f9b30500a0,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:20.939980 kubelet[1952]: E0515 09:20:20.939914 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:20.940062 kubelet[1952]: E0515 09:20:20.940006 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75fb8c8f64-z6k6g" May 15 09:20:20.940062 kubelet[1952]: E0515 09:20:20.940050 1952 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75fb8c8f64-z6k6g" May 15 09:20:20.940179 kubelet[1952]: E0515 09:20:20.940118 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-75fb8c8f64-z6k6g_calico-apiserver(b69c064a-8357-4600-9040-f9f9b30500a0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-75fb8c8f64-z6k6g_calico-apiserver(b69c064a-8357-4600-9040-f9f9b30500a0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75fb8c8f64-z6k6g" podUID="b69c064a-8357-4600-9040-f9f9b30500a0" May 15 09:20:20.961297 env[1156]: time="2025-05-15T09:20:20.961236156Z" level=error msg="Failed to destroy network for sandbox \"5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:20.962154 env[1156]: time="2025-05-15T09:20:20.962097086Z" level=error msg="encountered an error cleaning up failed sandbox \"5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:20.962340 env[1156]: time="2025-05-15T09:20:20.962288015Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75fb8c8f64-dsrx7,Uid:b6dcb7ec-8083-4d33-a2fd-c905bcb8ed81,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:20.962868 kubelet[1952]: E0515 09:20:20.962789 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:20.962956 kubelet[1952]: E0515 09:20:20.962904 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75fb8c8f64-dsrx7" May 15 09:20:20.962956 kubelet[1952]: E0515 09:20:20.962936 1952 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75fb8c8f64-dsrx7" May 15 09:20:20.963041 kubelet[1952]: E0515 09:20:20.963007 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-75fb8c8f64-dsrx7_calico-apiserver(b6dcb7ec-8083-4d33-a2fd-c905bcb8ed81)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-75fb8c8f64-dsrx7_calico-apiserver(b6dcb7ec-8083-4d33-a2fd-c905bcb8ed81)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75fb8c8f64-dsrx7" podUID="b6dcb7ec-8083-4d33-a2fd-c905bcb8ed81" May 15 09:20:20.977426 env[1156]: time="2025-05-15T09:20:20.977367645Z" level=error msg="Failed to destroy network for sandbox \"9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:20.977973 env[1156]: time="2025-05-15T09:20:20.977935724Z" level=error msg="encountered an error cleaning up failed sandbox \"9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:20.978127 env[1156]: time="2025-05-15T09:20:20.978092039Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bdc9bc67-wm5x8,Uid:b5d0e6bf-a1a0-4752-8f38-d1bf2e0f377c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:20.978722 kubelet[1952]: E0515 09:20:20.978492 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:20.978722 kubelet[1952]: E0515 09:20:20.978580 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6bdc9bc67-wm5x8" May 15 09:20:20.978722 kubelet[1952]: E0515 09:20:20.978604 1952 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6bdc9bc67-wm5x8" May 15 09:20:20.978902 kubelet[1952]: E0515 09:20:20.978658 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6bdc9bc67-wm5x8_calico-system(b5d0e6bf-a1a0-4752-8f38-d1bf2e0f377c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6bdc9bc67-wm5x8_calico-system(b5d0e6bf-a1a0-4752-8f38-d1bf2e0f377c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6bdc9bc67-wm5x8" podUID="b5d0e6bf-a1a0-4752-8f38-d1bf2e0f377c" May 15 09:20:21.185852 systemd[1]: Created slice kubepods-besteffort-podca20f477_1f70_4715_974d_aef8a8817c3d.slice. May 15 09:20:21.192187 env[1156]: time="2025-05-15T09:20:21.192109962Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gnt2w,Uid:ca20f477-1f70-4715-974d-aef8a8817c3d,Namespace:calico-system,Attempt:0,}" May 15 09:20:21.310615 env[1156]: time="2025-05-15T09:20:21.310459417Z" level=error msg="Failed to destroy network for sandbox \"5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:21.311779 env[1156]: time="2025-05-15T09:20:21.311697276Z" level=error msg="encountered an error cleaning up failed sandbox \"5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:21.312171 env[1156]: time="2025-05-15T09:20:21.312084945Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gnt2w,Uid:ca20f477-1f70-4715-974d-aef8a8817c3d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:21.313094 kubelet[1952]: E0515 09:20:21.312980 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:21.316985 kubelet[1952]: E0515 09:20:21.313163 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-gnt2w" May 15 09:20:21.316985 kubelet[1952]: E0515 09:20:21.313247 1952 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-gnt2w" May 15 09:20:21.316985 kubelet[1952]: E0515 09:20:21.313376 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-gnt2w_calico-system(ca20f477-1f70-4715-974d-aef8a8817c3d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-gnt2w_calico-system(ca20f477-1f70-4715-974d-aef8a8817c3d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-gnt2w" podUID="ca20f477-1f70-4715-974d-aef8a8817c3d" May 15 09:20:21.414620 kubelet[1952]: I0515 09:20:21.414510 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" May 15 09:20:21.419999 env[1156]: time="2025-05-15T09:20:21.419933460Z" level=info msg="StopPodSandbox for \"9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e\"" May 15 09:20:21.424113 kubelet[1952]: I0515 09:20:21.424043 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" May 15 09:20:21.427888 env[1156]: time="2025-05-15T09:20:21.427828347Z" level=info msg="StopPodSandbox for \"5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17\"" May 15 09:20:21.486827 env[1156]: time="2025-05-15T09:20:21.484628727Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 15 09:20:21.494565 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a-shm.mount: Deactivated successfully. May 15 09:20:21.504453 kubelet[1952]: I0515 09:20:21.504420 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" May 15 09:20:21.505988 env[1156]: time="2025-05-15T09:20:21.505946844Z" level=info msg="StopPodSandbox for \"a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b\"" May 15 09:20:21.512117 kubelet[1952]: I0515 09:20:21.511817 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" May 15 09:20:21.512755 env[1156]: time="2025-05-15T09:20:21.512691506Z" level=info msg="StopPodSandbox for \"5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1\"" May 15 09:20:21.516709 kubelet[1952]: I0515 09:20:21.516265 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" May 15 09:20:21.521686 env[1156]: time="2025-05-15T09:20:21.519733809Z" level=info msg="StopPodSandbox for \"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\"" May 15 09:20:21.532086 kubelet[1952]: I0515 09:20:21.531240 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" May 15 09:20:21.533723 env[1156]: time="2025-05-15T09:20:21.533681035Z" level=info msg="StopPodSandbox for \"3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6\"" May 15 09:20:21.561469 env[1156]: time="2025-05-15T09:20:21.561402293Z" level=error msg="StopPodSandbox for \"5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17\" failed" error="failed to destroy network for sandbox \"5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:21.562306 kubelet[1952]: E0515 09:20:21.561967 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" May 15 09:20:21.562306 kubelet[1952]: E0515 09:20:21.562089 1952 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17"} May 15 09:20:21.562306 kubelet[1952]: E0515 09:20:21.562210 1952 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ca20f477-1f70-4715-974d-aef8a8817c3d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 09:20:21.562306 kubelet[1952]: E0515 09:20:21.562271 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ca20f477-1f70-4715-974d-aef8a8817c3d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-gnt2w" podUID="ca20f477-1f70-4715-974d-aef8a8817c3d" May 15 09:20:21.564184 env[1156]: time="2025-05-15T09:20:21.564130487Z" level=error msg="StopPodSandbox for \"9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e\" failed" error="failed to destroy network for sandbox \"9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:21.564682 kubelet[1952]: E0515 09:20:21.564457 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" May 15 09:20:21.564682 kubelet[1952]: E0515 09:20:21.564516 1952 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e"} May 15 09:20:21.564682 kubelet[1952]: E0515 09:20:21.564595 1952 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b5d0e6bf-a1a0-4752-8f38-d1bf2e0f377c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 09:20:21.564682 kubelet[1952]: E0515 09:20:21.564653 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b5d0e6bf-a1a0-4752-8f38-d1bf2e0f377c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6bdc9bc67-wm5x8" podUID="b5d0e6bf-a1a0-4752-8f38-d1bf2e0f377c" May 15 09:20:21.622569 env[1156]: time="2025-05-15T09:20:21.622473810Z" level=error msg="StopPodSandbox for \"5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1\" failed" error="failed to destroy network for sandbox \"5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:21.623138 kubelet[1952]: E0515 09:20:21.622910 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" May 15 09:20:21.623138 kubelet[1952]: E0515 09:20:21.622967 1952 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1"} May 15 09:20:21.623138 kubelet[1952]: E0515 09:20:21.623010 1952 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b6dcb7ec-8083-4d33-a2fd-c905bcb8ed81\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 09:20:21.623138 kubelet[1952]: E0515 09:20:21.623048 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b6dcb7ec-8083-4d33-a2fd-c905bcb8ed81\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75fb8c8f64-dsrx7" podUID="b6dcb7ec-8083-4d33-a2fd-c905bcb8ed81" May 15 09:20:21.636595 env[1156]: time="2025-05-15T09:20:21.636516856Z" level=error msg="StopPodSandbox for \"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\" failed" error="failed to destroy network for sandbox \"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:21.637144 kubelet[1952]: E0515 09:20:21.636955 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" May 15 09:20:21.637144 kubelet[1952]: E0515 09:20:21.637027 1952 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a"} May 15 09:20:21.637144 kubelet[1952]: E0515 09:20:21.637067 1952 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b8006dac-3d47-4240-90f3-f7871027a257\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 09:20:21.637144 kubelet[1952]: E0515 09:20:21.637095 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b8006dac-3d47-4240-90f3-f7871027a257\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-nh2z8" podUID="b8006dac-3d47-4240-90f3-f7871027a257" May 15 09:20:21.637403 env[1156]: time="2025-05-15T09:20:21.637103991Z" level=error msg="StopPodSandbox for \"a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b\" failed" error="failed to destroy network for sandbox \"a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:21.637737 kubelet[1952]: E0515 09:20:21.637581 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" May 15 09:20:21.637737 kubelet[1952]: E0515 09:20:21.637612 1952 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b"} May 15 09:20:21.637737 kubelet[1952]: E0515 09:20:21.637662 1952 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"58ca787e-dacc-4065-9fb9-bd5f94da9491\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 09:20:21.637737 kubelet[1952]: E0515 09:20:21.637683 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"58ca787e-dacc-4065-9fb9-bd5f94da9491\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-vjn6s" podUID="58ca787e-dacc-4065-9fb9-bd5f94da9491" May 15 09:20:21.643072 env[1156]: time="2025-05-15T09:20:21.643012901Z" level=error msg="StopPodSandbox for \"3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6\" failed" error="failed to destroy network for sandbox \"3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:21.643477 kubelet[1952]: E0515 09:20:21.643322 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" May 15 09:20:21.643477 kubelet[1952]: E0515 09:20:21.643375 1952 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6"} May 15 09:20:21.643477 kubelet[1952]: E0515 09:20:21.643404 1952 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b69c064a-8357-4600-9040-f9f9b30500a0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 09:20:21.643477 kubelet[1952]: E0515 09:20:21.643443 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b69c064a-8357-4600-9040-f9f9b30500a0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75fb8c8f64-z6k6g" podUID="b69c064a-8357-4600-9040-f9f9b30500a0" May 15 09:20:32.169901 env[1156]: time="2025-05-15T09:20:32.169441513Z" level=info msg="StopPodSandbox for \"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\"" May 15 09:20:32.244513 env[1156]: time="2025-05-15T09:20:32.244398939Z" level=error msg="StopPodSandbox for \"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\" failed" error="failed to destroy network for sandbox \"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 09:20:32.245381 kubelet[1952]: E0515 09:20:32.244975 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" May 15 09:20:32.245381 kubelet[1952]: E0515 09:20:32.245167 1952 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a"} May 15 09:20:32.245381 kubelet[1952]: E0515 09:20:32.245249 1952 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b8006dac-3d47-4240-90f3-f7871027a257\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 09:20:32.245381 kubelet[1952]: E0515 09:20:32.245303 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b8006dac-3d47-4240-90f3-f7871027a257\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-nh2z8" podUID="b8006dac-3d47-4240-90f3-f7871027a257" May 15 09:20:33.636739 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1504367917.mount: Deactivated successfully. May 15 09:20:33.735840 env[1156]: time="2025-05-15T09:20:33.735665769Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:33.742277 env[1156]: time="2025-05-15T09:20:33.742192662Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:33.746443 env[1156]: time="2025-05-15T09:20:33.746368023Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:33.752483 env[1156]: time="2025-05-15T09:20:33.752404053Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:33.754823 env[1156]: time="2025-05-15T09:20:33.754730117Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 15 09:20:33.799347 env[1156]: time="2025-05-15T09:20:33.799287582Z" level=info msg="CreateContainer within sandbox \"ee1b49521f06cbf6d2ef00593d9408251ca2b8bca903d7248c38ffad16988240\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 09:20:33.839117 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount27059065.mount: Deactivated successfully. May 15 09:20:33.853120 env[1156]: time="2025-05-15T09:20:33.853061326Z" level=info msg="CreateContainer within sandbox \"ee1b49521f06cbf6d2ef00593d9408251ca2b8bca903d7248c38ffad16988240\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"1baed0fd5b8d0f5e87561ba7eefc4e63950f1175bfd80637fdcbe4853b78964c\"" May 15 09:20:33.854196 env[1156]: time="2025-05-15T09:20:33.854166725Z" level=info msg="StartContainer for \"1baed0fd5b8d0f5e87561ba7eefc4e63950f1175bfd80637fdcbe4853b78964c\"" May 15 09:20:33.886742 systemd[1]: Started cri-containerd-1baed0fd5b8d0f5e87561ba7eefc4e63950f1175bfd80637fdcbe4853b78964c.scope. May 15 09:20:33.921000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.923625 kernel: kauditd_printk_skb: 34 callbacks suppressed May 15 09:20:33.923814 kernel: audit: type=1400 audit(1747300833.921:1015): avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.921000 audit[2995]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fc7206f0b18 items=0 ppid=2397 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:33.936582 kernel: audit: type=1300 audit(1747300833.921:1015): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fc7206f0b18 items=0 ppid=2397 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:33.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162616564306664356238643066356538373536316261376565666334 May 15 09:20:33.946630 kernel: audit: type=1327 audit(1747300833.921:1015): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162616564306664356238643066356538373536316261376565666334 May 15 09:20:33.921000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.952612 kernel: audit: type=1400 audit(1747300833.921:1016): avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.921000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.963582 kernel: audit: type=1400 audit(1747300833.921:1016): avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.921000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.969595 kernel: audit: type=1400 audit(1747300833.921:1016): avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.921000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.975467 env[1156]: time="2025-05-15T09:20:33.975423163Z" level=info msg="StartContainer for \"1baed0fd5b8d0f5e87561ba7eefc4e63950f1175bfd80637fdcbe4853b78964c\" returns successfully" May 15 09:20:33.978554 kernel: audit: type=1400 audit(1747300833.921:1016): avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.921000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.985569 kernel: audit: type=1400 audit(1747300833.921:1016): avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.921000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.991568 kernel: audit: type=1400 audit(1747300833.921:1016): avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.991704 kernel: audit: type=1400 audit(1747300833.921:1016): avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.921000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.921000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.921000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.921000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.921000 audit: BPF prog-id=133 op=LOAD May 15 09:20:33.921000 audit[2995]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002900a8 items=0 ppid=2397 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:33.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162616564306664356238643066356538373536316261376565666334 May 15 09:20:33.928000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.928000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.928000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.928000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.928000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.928000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.928000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.928000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.928000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.928000 audit: BPF prog-id=134 op=LOAD May 15 09:20:33.928000 audit[2995]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002900f8 items=0 ppid=2397 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:33.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162616564306664356238643066356538373536316261376565666334 May 15 09:20:33.935000 audit: BPF prog-id=134 op=UNLOAD May 15 09:20:33.935000 audit: BPF prog-id=133 op=UNLOAD May 15 09:20:33.935000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.935000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.935000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.935000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.935000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.935000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.935000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.935000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.935000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.935000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:33.935000 audit: BPF prog-id=135 op=LOAD May 15 09:20:33.935000 audit[2995]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000290188 items=0 ppid=2397 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:33.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162616564306664356238643066356538373536316261376565666334 May 15 09:20:34.079998 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 15 09:20:34.080136 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 15 09:20:34.170834 env[1156]: time="2025-05-15T09:20:34.170716951Z" level=info msg="StopPodSandbox for \"9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e\"" May 15 09:20:34.172030 env[1156]: time="2025-05-15T09:20:34.171975778Z" level=info msg="StopPodSandbox for \"5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1\"" May 15 09:20:34.172505 env[1156]: time="2025-05-15T09:20:34.170745546Z" level=info msg="StopPodSandbox for \"5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17\"" May 15 09:20:34.477892 env[1156]: 2025-05-15 09:20:34.351 [INFO][3070] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" May 15 09:20:34.477892 env[1156]: 2025-05-15 09:20:34.351 [INFO][3070] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" iface="eth0" netns="/var/run/netns/cni-13e49b0e-e980-c355-b513-759c93a0d967" May 15 09:20:34.477892 env[1156]: 2025-05-15 09:20:34.352 [INFO][3070] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" iface="eth0" netns="/var/run/netns/cni-13e49b0e-e980-c355-b513-759c93a0d967" May 15 09:20:34.477892 env[1156]: 2025-05-15 09:20:34.352 [INFO][3070] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" iface="eth0" netns="/var/run/netns/cni-13e49b0e-e980-c355-b513-759c93a0d967" May 15 09:20:34.477892 env[1156]: 2025-05-15 09:20:34.352 [INFO][3070] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" May 15 09:20:34.477892 env[1156]: 2025-05-15 09:20:34.352 [INFO][3070] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" May 15 09:20:34.477892 env[1156]: 2025-05-15 09:20:34.443 [INFO][3104] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" HandleID="k8s-pod-network.5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-eth0" May 15 09:20:34.477892 env[1156]: 2025-05-15 09:20:34.449 [INFO][3104] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:20:34.477892 env[1156]: 2025-05-15 09:20:34.450 [INFO][3104] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:20:34.477892 env[1156]: 2025-05-15 09:20:34.468 [WARNING][3104] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" HandleID="k8s-pod-network.5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-eth0" May 15 09:20:34.477892 env[1156]: 2025-05-15 09:20:34.469 [INFO][3104] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" HandleID="k8s-pod-network.5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-eth0" May 15 09:20:34.477892 env[1156]: 2025-05-15 09:20:34.471 [INFO][3104] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:20:34.477892 env[1156]: 2025-05-15 09:20:34.474 [INFO][3070] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" May 15 09:20:34.477892 env[1156]: time="2025-05-15T09:20:34.477197370Z" level=info msg="TearDown network for sandbox \"5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17\" successfully" May 15 09:20:34.477892 env[1156]: time="2025-05-15T09:20:34.477280557Z" level=info msg="StopPodSandbox for \"5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17\" returns successfully" May 15 09:20:34.481280 env[1156]: time="2025-05-15T09:20:34.481235543Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gnt2w,Uid:ca20f477-1f70-4715-974d-aef8a8817c3d,Namespace:calico-system,Attempt:1,}" May 15 09:20:34.519199 env[1156]: 2025-05-15 09:20:34.336 [INFO][3069] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" May 15 09:20:34.519199 env[1156]: 2025-05-15 09:20:34.336 [INFO][3069] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" iface="eth0" netns="/var/run/netns/cni-174fd737-3ec6-9ac6-8203-40a940183ffc" May 15 09:20:34.519199 env[1156]: 2025-05-15 09:20:34.336 [INFO][3069] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" iface="eth0" netns="/var/run/netns/cni-174fd737-3ec6-9ac6-8203-40a940183ffc" May 15 09:20:34.519199 env[1156]: 2025-05-15 09:20:34.341 [INFO][3069] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" iface="eth0" netns="/var/run/netns/cni-174fd737-3ec6-9ac6-8203-40a940183ffc" May 15 09:20:34.519199 env[1156]: 2025-05-15 09:20:34.341 [INFO][3069] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" May 15 09:20:34.519199 env[1156]: 2025-05-15 09:20:34.341 [INFO][3069] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" May 15 09:20:34.519199 env[1156]: 2025-05-15 09:20:34.490 [INFO][3098] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" HandleID="k8s-pod-network.9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-eth0" May 15 09:20:34.519199 env[1156]: 2025-05-15 09:20:34.492 [INFO][3098] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:20:34.519199 env[1156]: 2025-05-15 09:20:34.492 [INFO][3098] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:20:34.519199 env[1156]: 2025-05-15 09:20:34.506 [WARNING][3098] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" HandleID="k8s-pod-network.9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-eth0" May 15 09:20:34.519199 env[1156]: 2025-05-15 09:20:34.506 [INFO][3098] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" HandleID="k8s-pod-network.9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-eth0" May 15 09:20:34.519199 env[1156]: 2025-05-15 09:20:34.513 [INFO][3098] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:20:34.519199 env[1156]: 2025-05-15 09:20:34.515 [INFO][3069] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" May 15 09:20:34.522586 env[1156]: time="2025-05-15T09:20:34.522255041Z" level=info msg="TearDown network for sandbox \"9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e\" successfully" May 15 09:20:34.522750 env[1156]: time="2025-05-15T09:20:34.522722780Z" level=info msg="StopPodSandbox for \"9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e\" returns successfully" May 15 09:20:34.525725 env[1156]: time="2025-05-15T09:20:34.525684839Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bdc9bc67-wm5x8,Uid:b5d0e6bf-a1a0-4752-8f38-d1bf2e0f377c,Namespace:calico-system,Attempt:1,}" May 15 09:20:34.545056 env[1156]: 2025-05-15 09:20:34.365 [INFO][3083] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" May 15 09:20:34.545056 env[1156]: 2025-05-15 09:20:34.365 [INFO][3083] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" iface="eth0" netns="/var/run/netns/cni-7b061ce7-d8f6-04f2-3349-c5702b6b0c2f" May 15 09:20:34.545056 env[1156]: 2025-05-15 09:20:34.365 [INFO][3083] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" iface="eth0" netns="/var/run/netns/cni-7b061ce7-d8f6-04f2-3349-c5702b6b0c2f" May 15 09:20:34.545056 env[1156]: 2025-05-15 09:20:34.365 [INFO][3083] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" iface="eth0" netns="/var/run/netns/cni-7b061ce7-d8f6-04f2-3349-c5702b6b0c2f" May 15 09:20:34.545056 env[1156]: 2025-05-15 09:20:34.365 [INFO][3083] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" May 15 09:20:34.545056 env[1156]: 2025-05-15 09:20:34.365 [INFO][3083] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" May 15 09:20:34.545056 env[1156]: 2025-05-15 09:20:34.530 [INFO][3111] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" HandleID="k8s-pod-network.5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-eth0" May 15 09:20:34.545056 env[1156]: 2025-05-15 09:20:34.530 [INFO][3111] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:20:34.545056 env[1156]: 2025-05-15 09:20:34.530 [INFO][3111] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:20:34.545056 env[1156]: 2025-05-15 09:20:34.539 [WARNING][3111] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" HandleID="k8s-pod-network.5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-eth0" May 15 09:20:34.545056 env[1156]: 2025-05-15 09:20:34.539 [INFO][3111] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" HandleID="k8s-pod-network.5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-eth0" May 15 09:20:34.545056 env[1156]: 2025-05-15 09:20:34.542 [INFO][3111] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:20:34.545056 env[1156]: 2025-05-15 09:20:34.543 [INFO][3083] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" May 15 09:20:34.546065 env[1156]: time="2025-05-15T09:20:34.546015127Z" level=info msg="TearDown network for sandbox \"5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1\" successfully" May 15 09:20:34.546195 env[1156]: time="2025-05-15T09:20:34.546171760Z" level=info msg="StopPodSandbox for \"5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1\" returns successfully" May 15 09:20:34.547273 env[1156]: time="2025-05-15T09:20:34.547209011Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75fb8c8f64-dsrx7,Uid:b6dcb7ec-8083-4d33-a2fd-c905bcb8ed81,Namespace:calico-apiserver,Attempt:1,}" May 15 09:20:34.634957 systemd[1]: run-netns-cni\x2d13e49b0e\x2de980\x2dc355\x2db513\x2d759c93a0d967.mount: Deactivated successfully. May 15 09:20:34.635070 systemd[1]: run-netns-cni\x2d174fd737\x2d3ec6\x2d9ac6\x2d8203\x2d40a940183ffc.mount: Deactivated successfully. May 15 09:20:34.635148 systemd[1]: run-netns-cni\x2d7b061ce7\x2dd8f6\x2d04f2\x2d3349\x2dc5702b6b0c2f.mount: Deactivated successfully. May 15 09:20:34.694358 systemd[1]: run-containerd-runc-k8s.io-1baed0fd5b8d0f5e87561ba7eefc4e63950f1175bfd80637fdcbe4853b78964c-runc.pJAXQq.mount: Deactivated successfully. May 15 09:20:34.996828 systemd-networkd[990]: cali9eb395fbbc2: Link UP May 15 09:20:34.998675 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 09:20:34.998759 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9eb395fbbc2: link becomes ready May 15 09:20:34.998945 systemd-networkd[990]: cali9eb395fbbc2: Gained carrier May 15 09:20:35.032014 env[1156]: 2025-05-15 09:20:34.641 [INFO][3118] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 15 09:20:35.032014 env[1156]: 2025-05-15 09:20:34.661 [INFO][3118] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-eth0 csi-node-driver- calico-system ca20f477-1f70-4715-974d-aef8a8817c3d 745 0 2025-05-15 09:20:02 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5bcd8f69 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510-3-7-n-1f13e4db17.novalocal csi-node-driver-gnt2w eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali9eb395fbbc2 [] []}} ContainerID="5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c" Namespace="calico-system" Pod="csi-node-driver-gnt2w" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-" May 15 09:20:35.032014 env[1156]: 2025-05-15 09:20:34.661 [INFO][3118] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c" Namespace="calico-system" Pod="csi-node-driver-gnt2w" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-eth0" May 15 09:20:35.032014 env[1156]: 2025-05-15 09:20:34.813 [INFO][3161] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c" HandleID="k8s-pod-network.5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-eth0" May 15 09:20:35.032014 env[1156]: 2025-05-15 09:20:34.833 [INFO][3161] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c" HandleID="k8s-pod-network.5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002910a0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-7-n-1f13e4db17.novalocal", "pod":"csi-node-driver-gnt2w", "timestamp":"2025-05-15 09:20:34.812894163 +0000 UTC"}, Hostname:"ci-3510-3-7-n-1f13e4db17.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 09:20:35.032014 env[1156]: 2025-05-15 09:20:34.833 [INFO][3161] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:20:35.032014 env[1156]: 2025-05-15 09:20:34.833 [INFO][3161] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:20:35.032014 env[1156]: 2025-05-15 09:20:34.833 [INFO][3161] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-1f13e4db17.novalocal' May 15 09:20:35.032014 env[1156]: 2025-05-15 09:20:34.841 [INFO][3161] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.032014 env[1156]: 2025-05-15 09:20:34.935 [INFO][3161] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.032014 env[1156]: 2025-05-15 09:20:34.942 [INFO][3161] ipam/ipam.go 489: Trying affinity for 192.168.26.64/26 host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.032014 env[1156]: 2025-05-15 09:20:34.947 [INFO][3161] ipam/ipam.go 155: Attempting to load block cidr=192.168.26.64/26 host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.032014 env[1156]: 2025-05-15 09:20:34.952 [INFO][3161] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.26.64/26 host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.032014 env[1156]: 2025-05-15 09:20:34.952 [INFO][3161] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.26.64/26 handle="k8s-pod-network.5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.032014 env[1156]: 2025-05-15 09:20:34.955 [INFO][3161] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c May 15 09:20:35.032014 env[1156]: 2025-05-15 09:20:34.963 [INFO][3161] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.26.64/26 handle="k8s-pod-network.5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.032014 env[1156]: 2025-05-15 09:20:34.972 [INFO][3161] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.26.65/26] block=192.168.26.64/26 handle="k8s-pod-network.5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.032014 env[1156]: 2025-05-15 09:20:34.973 [INFO][3161] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.26.65/26] handle="k8s-pod-network.5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.032014 env[1156]: 2025-05-15 09:20:34.973 [INFO][3161] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:20:35.032014 env[1156]: 2025-05-15 09:20:34.973 [INFO][3161] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.26.65/26] IPv6=[] ContainerID="5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c" HandleID="k8s-pod-network.5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-eth0" May 15 09:20:35.034403 env[1156]: 2025-05-15 09:20:34.974 [INFO][3118] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c" Namespace="calico-system" Pod="csi-node-driver-gnt2w" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ca20f477-1f70-4715-974d-aef8a8817c3d", ResourceVersion:"745", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 20, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1f13e4db17.novalocal", ContainerID:"", Pod:"csi-node-driver-gnt2w", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.26.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9eb395fbbc2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:20:35.034403 env[1156]: 2025-05-15 09:20:34.975 [INFO][3118] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.26.65/32] ContainerID="5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c" Namespace="calico-system" Pod="csi-node-driver-gnt2w" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-eth0" May 15 09:20:35.034403 env[1156]: 2025-05-15 09:20:34.975 [INFO][3118] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9eb395fbbc2 ContainerID="5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c" Namespace="calico-system" Pod="csi-node-driver-gnt2w" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-eth0" May 15 09:20:35.034403 env[1156]: 2025-05-15 09:20:34.998 [INFO][3118] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c" Namespace="calico-system" Pod="csi-node-driver-gnt2w" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-eth0" May 15 09:20:35.034403 env[1156]: 2025-05-15 09:20:34.999 [INFO][3118] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c" Namespace="calico-system" Pod="csi-node-driver-gnt2w" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ca20f477-1f70-4715-974d-aef8a8817c3d", ResourceVersion:"745", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 20, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1f13e4db17.novalocal", ContainerID:"5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c", Pod:"csi-node-driver-gnt2w", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.26.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9eb395fbbc2", MAC:"56:89:73:e5:64:8b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:20:35.034403 env[1156]: 2025-05-15 09:20:35.030 [INFO][3118] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c" Namespace="calico-system" Pod="csi-node-driver-gnt2w" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-eth0" May 15 09:20:35.040398 kubelet[1952]: I0515 09:20:35.040305 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-bczxv" podStartSLOduration=2.440436175 podStartE2EDuration="33.040247766s" podCreationTimestamp="2025-05-15 09:20:02 +0000 UTC" firstStartedPulling="2025-05-15 09:20:03.160982048 +0000 UTC m=+15.131576019" lastFinishedPulling="2025-05-15 09:20:33.760793619 +0000 UTC m=+45.731387610" observedRunningTime="2025-05-15 09:20:34.64134877 +0000 UTC m=+46.611942741" watchObservedRunningTime="2025-05-15 09:20:35.040247766 +0000 UTC m=+47.010841748" May 15 09:20:35.060610 env[1156]: time="2025-05-15T09:20:35.060455982Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 09:20:35.060610 env[1156]: time="2025-05-15T09:20:35.060558063Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 09:20:35.060901 env[1156]: time="2025-05-15T09:20:35.060574775Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 09:20:35.061253 env[1156]: time="2025-05-15T09:20:35.061200070Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c pid=3251 runtime=io.containerd.runc.v2 May 15 09:20:35.090101 systemd[1]: Started cri-containerd-5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c.scope. May 15 09:20:35.112248 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibd4136e3802: link becomes ready May 15 09:20:35.111370 systemd-networkd[990]: calibd4136e3802: Link UP May 15 09:20:35.111644 systemd-networkd[990]: calibd4136e3802: Gained carrier May 15 09:20:35.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.146000 audit: BPF prog-id=136 op=LOAD May 15 09:20:35.150193 env[1156]: 2025-05-15 09:20:34.755 [INFO][3135] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 15 09:20:35.150193 env[1156]: 2025-05-15 09:20:34.778 [INFO][3135] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-eth0 calico-apiserver-75fb8c8f64- calico-apiserver b6dcb7ec-8083-4d33-a2fd-c905bcb8ed81 746 0 2025-05-15 09:20:02 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:75fb8c8f64 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-7-n-1f13e4db17.novalocal calico-apiserver-75fb8c8f64-dsrx7 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calibd4136e3802 [] []}} ContainerID="3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d" Namespace="calico-apiserver" Pod="calico-apiserver-75fb8c8f64-dsrx7" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-" May 15 09:20:35.150193 env[1156]: 2025-05-15 09:20:34.778 [INFO][3135] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d" Namespace="calico-apiserver" Pod="calico-apiserver-75fb8c8f64-dsrx7" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-eth0" May 15 09:20:35.150193 env[1156]: 2025-05-15 09:20:34.866 [INFO][3196] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d" HandleID="k8s-pod-network.3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-eth0" May 15 09:20:35.150193 env[1156]: 2025-05-15 09:20:34.934 [INFO][3196] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d" HandleID="k8s-pod-network.3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000336d50), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-7-n-1f13e4db17.novalocal", "pod":"calico-apiserver-75fb8c8f64-dsrx7", "timestamp":"2025-05-15 09:20:34.864400089 +0000 UTC"}, Hostname:"ci-3510-3-7-n-1f13e4db17.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 09:20:35.150193 env[1156]: 2025-05-15 09:20:34.934 [INFO][3196] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:20:35.150193 env[1156]: 2025-05-15 09:20:34.973 [INFO][3196] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:20:35.150193 env[1156]: 2025-05-15 09:20:34.973 [INFO][3196] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-1f13e4db17.novalocal' May 15 09:20:35.150193 env[1156]: 2025-05-15 09:20:34.978 [INFO][3196] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.150193 env[1156]: 2025-05-15 09:20:35.031 [INFO][3196] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.150193 env[1156]: 2025-05-15 09:20:35.052 [INFO][3196] ipam/ipam.go 489: Trying affinity for 192.168.26.64/26 host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.150193 env[1156]: 2025-05-15 09:20:35.058 [INFO][3196] ipam/ipam.go 155: Attempting to load block cidr=192.168.26.64/26 host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.150193 env[1156]: 2025-05-15 09:20:35.064 [INFO][3196] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.26.64/26 host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.150193 env[1156]: 2025-05-15 09:20:35.065 [INFO][3196] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.26.64/26 handle="k8s-pod-network.3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.150193 env[1156]: 2025-05-15 09:20:35.068 [INFO][3196] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d May 15 09:20:35.150193 env[1156]: 2025-05-15 09:20:35.084 [INFO][3196] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.26.64/26 handle="k8s-pod-network.3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.150193 env[1156]: 2025-05-15 09:20:35.103 [INFO][3196] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.26.66/26] block=192.168.26.64/26 handle="k8s-pod-network.3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.150193 env[1156]: 2025-05-15 09:20:35.103 [INFO][3196] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.26.66/26] handle="k8s-pod-network.3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.150193 env[1156]: 2025-05-15 09:20:35.103 [INFO][3196] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:20:35.150193 env[1156]: 2025-05-15 09:20:35.103 [INFO][3196] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.26.66/26] IPv6=[] ContainerID="3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d" HandleID="k8s-pod-network.3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-eth0" May 15 09:20:35.151180 env[1156]: 2025-05-15 09:20:35.105 [INFO][3135] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d" Namespace="calico-apiserver" Pod="calico-apiserver-75fb8c8f64-dsrx7" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-eth0", GenerateName:"calico-apiserver-75fb8c8f64-", Namespace:"calico-apiserver", SelfLink:"", UID:"b6dcb7ec-8083-4d33-a2fd-c905bcb8ed81", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 20, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75fb8c8f64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1f13e4db17.novalocal", ContainerID:"", Pod:"calico-apiserver-75fb8c8f64-dsrx7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.26.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibd4136e3802", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:20:35.151180 env[1156]: 2025-05-15 09:20:35.105 [INFO][3135] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.26.66/32] ContainerID="3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d" Namespace="calico-apiserver" Pod="calico-apiserver-75fb8c8f64-dsrx7" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-eth0" May 15 09:20:35.151180 env[1156]: 2025-05-15 09:20:35.105 [INFO][3135] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calibd4136e3802 ContainerID="3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d" Namespace="calico-apiserver" Pod="calico-apiserver-75fb8c8f64-dsrx7" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-eth0" May 15 09:20:35.151180 env[1156]: 2025-05-15 09:20:35.108 [INFO][3135] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d" Namespace="calico-apiserver" Pod="calico-apiserver-75fb8c8f64-dsrx7" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-eth0" May 15 09:20:35.151180 env[1156]: 2025-05-15 09:20:35.112 [INFO][3135] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d" Namespace="calico-apiserver" Pod="calico-apiserver-75fb8c8f64-dsrx7" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-eth0", GenerateName:"calico-apiserver-75fb8c8f64-", Namespace:"calico-apiserver", SelfLink:"", UID:"b6dcb7ec-8083-4d33-a2fd-c905bcb8ed81", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 20, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75fb8c8f64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1f13e4db17.novalocal", ContainerID:"3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d", Pod:"calico-apiserver-75fb8c8f64-dsrx7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.26.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibd4136e3802", MAC:"c2:93:db:ab:f7:a9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:20:35.151180 env[1156]: 2025-05-15 09:20:35.148 [INFO][3135] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d" Namespace="calico-apiserver" Pod="calico-apiserver-75fb8c8f64-dsrx7" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-eth0" May 15 09:20:35.153000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.153000 audit[3260]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3251 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:35.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565306666626666653836636561643064373835666131623234303236 May 15 09:20:35.154000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.154000 audit[3260]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3251 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:35.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565306666626666653836636561643064373835666131623234303236 May 15 09:20:35.155000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.155000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.155000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.155000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.155000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.155000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.155000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.155000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.155000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.155000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.155000 audit: BPF prog-id=137 op=LOAD May 15 09:20:35.155000 audit[3260]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0001ad2d0 items=0 ppid=3251 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:35.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565306666626666653836636561643064373835666131623234303236 May 15 09:20:35.156000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.156000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.156000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.156000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.156000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.156000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.156000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.156000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.156000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.156000 audit: BPF prog-id=138 op=LOAD May 15 09:20:35.156000 audit[3260]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0001ad318 items=0 ppid=3251 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:35.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565306666626666653836636561643064373835666131623234303236 May 15 09:20:35.157000 audit: BPF prog-id=138 op=UNLOAD May 15 09:20:35.158000 audit: BPF prog-id=137 op=UNLOAD May 15 09:20:35.158000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.158000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.158000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.158000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.158000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.158000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.158000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.158000 audit[3260]: AVC avc: denied { perfmon } for pid=3260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.158000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.158000 audit[3260]: AVC avc: denied { bpf } for pid=3260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.158000 audit: BPF prog-id=139 op=LOAD May 15 09:20:35.158000 audit[3260]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0001ad728 items=0 ppid=3251 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:35.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565306666626666653836636561643064373835666131623234303236 May 15 09:20:35.183255 env[1156]: time="2025-05-15T09:20:35.183172511Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 09:20:35.183558 env[1156]: time="2025-05-15T09:20:35.183497893Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 09:20:35.183759 env[1156]: time="2025-05-15T09:20:35.183723697Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 09:20:35.184644 env[1156]: time="2025-05-15T09:20:35.184139880Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d pid=3296 runtime=io.containerd.runc.v2 May 15 09:20:35.209152 systemd-networkd[990]: cali16c4f5b4737: Link UP May 15 09:20:35.215601 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali16c4f5b4737: link becomes ready May 15 09:20:35.215809 systemd-networkd[990]: cali16c4f5b4737: Gained carrier May 15 09:20:35.221330 systemd[1]: Started cri-containerd-3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d.scope. May 15 09:20:35.229990 env[1156]: time="2025-05-15T09:20:35.229925135Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gnt2w,Uid:ca20f477-1f70-4715-974d-aef8a8817c3d,Namespace:calico-system,Attempt:1,} returns sandbox id \"5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c\"" May 15 09:20:35.235793 env[1156]: time="2025-05-15T09:20:35.235758662Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 15 09:20:35.256428 env[1156]: 2025-05-15 09:20:34.705 [INFO][3128] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 15 09:20:35.256428 env[1156]: 2025-05-15 09:20:34.727 [INFO][3128] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-eth0 calico-kube-controllers-6bdc9bc67- calico-system b5d0e6bf-a1a0-4752-8f38-d1bf2e0f377c 744 0 2025-05-15 09:20:03 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6bdc9bc67 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-7-n-1f13e4db17.novalocal calico-kube-controllers-6bdc9bc67-wm5x8 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali16c4f5b4737 [] []}} ContainerID="30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374" Namespace="calico-system" Pod="calico-kube-controllers-6bdc9bc67-wm5x8" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-" May 15 09:20:35.256428 env[1156]: 2025-05-15 09:20:34.727 [INFO][3128] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374" Namespace="calico-system" Pod="calico-kube-controllers-6bdc9bc67-wm5x8" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-eth0" May 15 09:20:35.256428 env[1156]: 2025-05-15 09:20:34.875 [INFO][3179] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374" HandleID="k8s-pod-network.30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-eth0" May 15 09:20:35.256428 env[1156]: 2025-05-15 09:20:34.936 [INFO][3179] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374" HandleID="k8s-pod-network.30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050f30), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-7-n-1f13e4db17.novalocal", "pod":"calico-kube-controllers-6bdc9bc67-wm5x8", "timestamp":"2025-05-15 09:20:34.875650993 +0000 UTC"}, Hostname:"ci-3510-3-7-n-1f13e4db17.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 09:20:35.256428 env[1156]: 2025-05-15 09:20:34.937 [INFO][3179] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:20:35.256428 env[1156]: 2025-05-15 09:20:35.103 [INFO][3179] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:20:35.256428 env[1156]: 2025-05-15 09:20:35.103 [INFO][3179] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-1f13e4db17.novalocal' May 15 09:20:35.256428 env[1156]: 2025-05-15 09:20:35.118 [INFO][3179] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.256428 env[1156]: 2025-05-15 09:20:35.136 [INFO][3179] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.256428 env[1156]: 2025-05-15 09:20:35.160 [INFO][3179] ipam/ipam.go 489: Trying affinity for 192.168.26.64/26 host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.256428 env[1156]: 2025-05-15 09:20:35.163 [INFO][3179] ipam/ipam.go 155: Attempting to load block cidr=192.168.26.64/26 host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.256428 env[1156]: 2025-05-15 09:20:35.167 [INFO][3179] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.26.64/26 host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.256428 env[1156]: 2025-05-15 09:20:35.167 [INFO][3179] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.26.64/26 handle="k8s-pod-network.30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.256428 env[1156]: 2025-05-15 09:20:35.171 [INFO][3179] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374 May 15 09:20:35.256428 env[1156]: 2025-05-15 09:20:35.178 [INFO][3179] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.26.64/26 handle="k8s-pod-network.30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.256428 env[1156]: 2025-05-15 09:20:35.193 [INFO][3179] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.26.67/26] block=192.168.26.64/26 handle="k8s-pod-network.30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.256428 env[1156]: 2025-05-15 09:20:35.193 [INFO][3179] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.26.67/26] handle="k8s-pod-network.30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:35.256428 env[1156]: 2025-05-15 09:20:35.193 [INFO][3179] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:20:35.256428 env[1156]: 2025-05-15 09:20:35.193 [INFO][3179] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.26.67/26] IPv6=[] ContainerID="30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374" HandleID="k8s-pod-network.30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-eth0" May 15 09:20:35.257507 env[1156]: 2025-05-15 09:20:35.195 [INFO][3128] cni-plugin/k8s.go 386: Populated endpoint ContainerID="30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374" Namespace="calico-system" Pod="calico-kube-controllers-6bdc9bc67-wm5x8" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-eth0", GenerateName:"calico-kube-controllers-6bdc9bc67-", Namespace:"calico-system", SelfLink:"", UID:"b5d0e6bf-a1a0-4752-8f38-d1bf2e0f377c", ResourceVersion:"744", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 20, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6bdc9bc67", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1f13e4db17.novalocal", ContainerID:"", Pod:"calico-kube-controllers-6bdc9bc67-wm5x8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.26.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali16c4f5b4737", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:20:35.257507 env[1156]: 2025-05-15 09:20:35.195 [INFO][3128] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.26.67/32] ContainerID="30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374" Namespace="calico-system" Pod="calico-kube-controllers-6bdc9bc67-wm5x8" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-eth0" May 15 09:20:35.257507 env[1156]: 2025-05-15 09:20:35.195 [INFO][3128] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali16c4f5b4737 ContainerID="30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374" Namespace="calico-system" Pod="calico-kube-controllers-6bdc9bc67-wm5x8" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-eth0" May 15 09:20:35.257507 env[1156]: 2025-05-15 09:20:35.215 [INFO][3128] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374" Namespace="calico-system" Pod="calico-kube-controllers-6bdc9bc67-wm5x8" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-eth0" May 15 09:20:35.257507 env[1156]: 2025-05-15 09:20:35.216 [INFO][3128] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374" Namespace="calico-system" Pod="calico-kube-controllers-6bdc9bc67-wm5x8" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-eth0", GenerateName:"calico-kube-controllers-6bdc9bc67-", Namespace:"calico-system", SelfLink:"", UID:"b5d0e6bf-a1a0-4752-8f38-d1bf2e0f377c", ResourceVersion:"744", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 20, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6bdc9bc67", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1f13e4db17.novalocal", ContainerID:"30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374", Pod:"calico-kube-controllers-6bdc9bc67-wm5x8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.26.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali16c4f5b4737", MAC:"02:70:2a:e8:2b:97", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:20:35.257507 env[1156]: 2025-05-15 09:20:35.254 [INFO][3128] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374" Namespace="calico-system" Pod="calico-kube-controllers-6bdc9bc67-wm5x8" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-eth0" May 15 09:20:35.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.262000 audit: BPF prog-id=140 op=LOAD May 15 09:20:35.265000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3296 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:35.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366393334336662366565373564656139666236376134336564643533 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3296 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:35.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366393334336662366565373564656139666236376134336564643533 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit: BPF prog-id=141 op=LOAD May 15 09:20:35.265000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002d9f80 items=0 ppid=3296 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:35.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366393334336662366565373564656139666236376134336564643533 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit: BPF prog-id=142 op=LOAD May 15 09:20:35.265000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002d9fc8 items=0 ppid=3296 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:35.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366393334336662366565373564656139666236376134336564643533 May 15 09:20:35.265000 audit: BPF prog-id=142 op=UNLOAD May 15 09:20:35.265000 audit: BPF prog-id=141 op=UNLOAD May 15 09:20:35.265000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.265000 audit: BPF prog-id=143 op=LOAD May 15 09:20:35.265000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003da3d8 items=0 ppid=3296 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:35.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366393334336662366565373564656139666236376134336564643533 May 15 09:20:35.307129 env[1156]: time="2025-05-15T09:20:35.307049552Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 09:20:35.307306 env[1156]: time="2025-05-15T09:20:35.307142647Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 09:20:35.307306 env[1156]: time="2025-05-15T09:20:35.307177843Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 09:20:35.310692 env[1156]: time="2025-05-15T09:20:35.310603765Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374 pid=3349 runtime=io.containerd.runc.v2 May 15 09:20:35.336871 systemd[1]: Started cri-containerd-30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374.scope. May 15 09:20:35.361534 env[1156]: time="2025-05-15T09:20:35.361416532Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75fb8c8f64-dsrx7,Uid:b6dcb7ec-8083-4d33-a2fd-c905bcb8ed81,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d\"" May 15 09:20:35.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.370000 audit: BPF prog-id=144 op=LOAD May 15 09:20:35.371000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.371000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3349 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:35.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330353735663433343935323439383031336164386238396534356237 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3349 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:35.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330353735663433343935323439383031336164386238396534356237 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit: BPF prog-id=145 op=LOAD May 15 09:20:35.372000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0001a3e40 items=0 ppid=3349 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:35.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330353735663433343935323439383031336164386238396534356237 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit: BPF prog-id=146 op=LOAD May 15 09:20:35.372000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0001a3e88 items=0 ppid=3349 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:35.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330353735663433343935323439383031336164386238396534356237 May 15 09:20:35.372000 audit: BPF prog-id=146 op=UNLOAD May 15 09:20:35.372000 audit: BPF prog-id=145 op=UNLOAD May 15 09:20:35.372000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:35.372000 audit: BPF prog-id=147 op=LOAD May 15 09:20:35.372000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0001ca298 items=0 ppid=3349 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:35.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330353735663433343935323439383031336164386238396534356237 May 15 09:20:35.457288 env[1156]: time="2025-05-15T09:20:35.457246119Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bdc9bc67-wm5x8,Uid:b5d0e6bf-a1a0-4752-8f38-d1bf2e0f377c,Namespace:calico-system,Attempt:1,} returns sandbox id \"30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374\"" May 15 09:20:35.641664 systemd[1]: run-containerd-runc-k8s.io-1baed0fd5b8d0f5e87561ba7eefc4e63950f1175bfd80637fdcbe4853b78964c-runc.C4cdgf.mount: Deactivated successfully. May 15 09:20:35.679017 systemd[1]: run-containerd-runc-k8s.io-1baed0fd5b8d0f5e87561ba7eefc4e63950f1175bfd80637fdcbe4853b78964c-runc.RUeIWJ.mount: Deactivated successfully. May 15 09:20:35.888000 audit[3451]: AVC avc: denied { write } for pid=3451 comm="tee" name="fd" dev="proc" ino=26624 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 09:20:35.888000 audit[3451]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc1204c9f8 a2=241 a3=1b6 items=1 ppid=3427 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:35.888000 audit: CWD cwd="/etc/service/enabled/confd/log" May 15 09:20:35.888000 audit: PATH item=0 name="/dev/fd/63" inode=26619 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:20:35.888000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 09:20:35.896000 audit[3461]: AVC avc: denied { write } for pid=3461 comm="tee" name="fd" dev="proc" ino=27658 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 09:20:35.896000 audit[3461]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc3cb9e9f9 a2=241 a3=1b6 items=1 ppid=3422 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:35.896000 audit: CWD cwd="/etc/service/enabled/bird/log" May 15 09:20:35.896000 audit: PATH item=0 name="/dev/fd/63" inode=27652 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:20:35.896000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 09:20:35.900000 audit[3464]: AVC avc: denied { write } for pid=3464 comm="tee" name="fd" dev="proc" ino=27663 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 09:20:35.900000 audit[3464]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeff2439f8 a2=241 a3=1b6 items=1 ppid=3424 pid=3464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:35.900000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 15 09:20:35.900000 audit: PATH item=0 name="/dev/fd/63" inode=27655 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:20:35.900000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 09:20:35.939000 audit[3477]: AVC avc: denied { write } for pid=3477 comm="tee" name="fd" dev="proc" ino=27680 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 09:20:35.939000 audit[3477]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffed01bc9e9 a2=241 a3=1b6 items=1 ppid=3420 pid=3477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:35.939000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 15 09:20:35.939000 audit: PATH item=0 name="/dev/fd/63" inode=27675 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:20:35.939000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 09:20:35.955000 audit[3488]: AVC avc: denied { write } for pid=3488 comm="tee" name="fd" dev="proc" ino=26780 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 09:20:35.957000 audit[3486]: AVC avc: denied { write } for pid=3486 comm="tee" name="fd" dev="proc" ino=26783 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 09:20:35.957000 audit[3484]: AVC avc: denied { write } for pid=3484 comm="tee" name="fd" dev="proc" ino=26786 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 09:20:35.957000 audit[3484]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffed6a099e8 a2=241 a3=1b6 items=1 ppid=3431 pid=3484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:35.957000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 09:20:35.957000 audit: PATH item=0 name="/dev/fd/63" inode=26775 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:20:35.957000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 09:20:35.957000 audit[3486]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe7b1d59fa a2=241 a3=1b6 items=1 ppid=3418 pid=3486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:35.957000 audit: CWD cwd="/etc/service/enabled/cni/log" May 15 09:20:35.957000 audit: PATH item=0 name="/dev/fd/63" inode=26776 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:20:35.957000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 09:20:35.955000 audit[3488]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc05bb19f8 a2=241 a3=1b6 items=1 ppid=3429 pid=3488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:35.955000 audit: CWD cwd="/etc/service/enabled/felix/log" May 15 09:20:35.955000 audit: PATH item=0 name="/dev/fd/63" inode=26777 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 09:20:35.955000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 09:20:36.171510 env[1156]: time="2025-05-15T09:20:36.171381286Z" level=info msg="StopPodSandbox for \"3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6\"" May 15 09:20:36.172954 env[1156]: time="2025-05-15T09:20:36.172866158Z" level=info msg="StopPodSandbox for \"a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b\"" May 15 09:20:36.321093 systemd-networkd[990]: calibd4136e3802: Gained IPv6LL May 15 09:20:36.544209 env[1156]: 2025-05-15 09:20:36.300 [INFO][3514] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" May 15 09:20:36.544209 env[1156]: 2025-05-15 09:20:36.300 [INFO][3514] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" iface="eth0" netns="/var/run/netns/cni-e235e03b-52c5-5b1e-1ed2-26ad86d47346" May 15 09:20:36.544209 env[1156]: 2025-05-15 09:20:36.300 [INFO][3514] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" iface="eth0" netns="/var/run/netns/cni-e235e03b-52c5-5b1e-1ed2-26ad86d47346" May 15 09:20:36.544209 env[1156]: 2025-05-15 09:20:36.300 [INFO][3514] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" iface="eth0" netns="/var/run/netns/cni-e235e03b-52c5-5b1e-1ed2-26ad86d47346" May 15 09:20:36.544209 env[1156]: 2025-05-15 09:20:36.300 [INFO][3514] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" May 15 09:20:36.544209 env[1156]: 2025-05-15 09:20:36.300 [INFO][3514] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" May 15 09:20:36.544209 env[1156]: 2025-05-15 09:20:36.391 [INFO][3542] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" HandleID="k8s-pod-network.3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-eth0" May 15 09:20:36.544209 env[1156]: 2025-05-15 09:20:36.391 [INFO][3542] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:20:36.544209 env[1156]: 2025-05-15 09:20:36.391 [INFO][3542] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:20:36.544209 env[1156]: 2025-05-15 09:20:36.499 [WARNING][3542] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" HandleID="k8s-pod-network.3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-eth0" May 15 09:20:36.544209 env[1156]: 2025-05-15 09:20:36.499 [INFO][3542] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" HandleID="k8s-pod-network.3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-eth0" May 15 09:20:36.544209 env[1156]: 2025-05-15 09:20:36.526 [INFO][3542] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:20:36.544209 env[1156]: 2025-05-15 09:20:36.535 [INFO][3514] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" May 15 09:20:36.549621 systemd[1]: run-netns-cni\x2de235e03b\x2d52c5\x2d5b1e\x2d1ed2\x2d26ad86d47346.mount: Deactivated successfully. May 15 09:20:36.553412 env[1156]: time="2025-05-15T09:20:36.553354670Z" level=info msg="TearDown network for sandbox \"3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6\" successfully" May 15 09:20:36.553584 env[1156]: time="2025-05-15T09:20:36.553513368Z" level=info msg="StopPodSandbox for \"3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6\" returns successfully" May 15 09:20:36.555389 env[1156]: time="2025-05-15T09:20:36.554926014Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75fb8c8f64-z6k6g,Uid:b69c064a-8357-4600-9040-f9f9b30500a0,Namespace:calico-apiserver,Attempt:1,}" May 15 09:20:36.597086 env[1156]: 2025-05-15 09:20:36.484 [INFO][3535] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" May 15 09:20:36.597086 env[1156]: 2025-05-15 09:20:36.485 [INFO][3535] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" iface="eth0" netns="/var/run/netns/cni-e1e83f7b-1ad6-af06-708e-947bc4ac2424" May 15 09:20:36.597086 env[1156]: 2025-05-15 09:20:36.485 [INFO][3535] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" iface="eth0" netns="/var/run/netns/cni-e1e83f7b-1ad6-af06-708e-947bc4ac2424" May 15 09:20:36.597086 env[1156]: 2025-05-15 09:20:36.488 [INFO][3535] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" iface="eth0" netns="/var/run/netns/cni-e1e83f7b-1ad6-af06-708e-947bc4ac2424" May 15 09:20:36.597086 env[1156]: 2025-05-15 09:20:36.488 [INFO][3535] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" May 15 09:20:36.597086 env[1156]: 2025-05-15 09:20:36.488 [INFO][3535] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" May 15 09:20:36.597086 env[1156]: 2025-05-15 09:20:36.558 [INFO][3552] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" HandleID="k8s-pod-network.a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-eth0" May 15 09:20:36.597086 env[1156]: 2025-05-15 09:20:36.558 [INFO][3552] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:20:36.597086 env[1156]: 2025-05-15 09:20:36.559 [INFO][3552] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:20:36.597086 env[1156]: 2025-05-15 09:20:36.590 [WARNING][3552] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" HandleID="k8s-pod-network.a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-eth0" May 15 09:20:36.597086 env[1156]: 2025-05-15 09:20:36.591 [INFO][3552] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" HandleID="k8s-pod-network.a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-eth0" May 15 09:20:36.597086 env[1156]: 2025-05-15 09:20:36.594 [INFO][3552] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:20:36.597086 env[1156]: 2025-05-15 09:20:36.595 [INFO][3535] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" May 15 09:20:36.600341 env[1156]: time="2025-05-15T09:20:36.600299931Z" level=info msg="TearDown network for sandbox \"a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b\" successfully" May 15 09:20:36.600433 env[1156]: time="2025-05-15T09:20:36.600412823Z" level=info msg="StopPodSandbox for \"a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b\" returns successfully" May 15 09:20:36.600997 systemd[1]: run-netns-cni\x2de1e83f7b\x2d1ad6\x2daf06\x2d708e\x2d947bc4ac2424.mount: Deactivated successfully. May 15 09:20:36.603085 env[1156]: time="2025-05-15T09:20:36.603054861Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-vjn6s,Uid:58ca787e-dacc-4065-9fb9-bd5f94da9491,Namespace:kube-system,Attempt:1,}" May 15 09:20:36.662000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit: BPF prog-id=148 op=LOAD May 15 09:20:36.662000 audit[3586]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffca2b88700 a2=98 a3=3 items=0 ppid=3430 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:20:36.662000 audit: BPF prog-id=148 op=UNLOAD May 15 09:20:36.662000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit: BPF prog-id=149 op=LOAD May 15 09:20:36.662000 audit[3586]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca2b884e0 a2=74 a3=540051 items=0 ppid=3430 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:20:36.662000 audit: BPF prog-id=149 op=UNLOAD May 15 09:20:36.662000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.662000 audit: BPF prog-id=150 op=LOAD May 15 09:20:36.662000 audit[3586]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca2b88510 a2=94 a3=2 items=0 ppid=3430 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.662000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:20:36.662000 audit: BPF prog-id=150 op=UNLOAD May 15 09:20:36.703765 systemd-networkd[990]: cali9eb395fbbc2: Gained IPv6LL May 15 09:20:36.704085 systemd-networkd[990]: cali16c4f5b4737: Gained IPv6LL May 15 09:20:36.790000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.790000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.790000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.790000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.790000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.790000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.790000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.790000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.790000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.790000 audit: BPF prog-id=151 op=LOAD May 15 09:20:36.790000 audit[3586]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca2b883d0 a2=40 a3=1 items=0 ppid=3430 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.790000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:20:36.790000 audit: BPF prog-id=151 op=UNLOAD May 15 09:20:36.790000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.790000 audit[3586]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffca2b884a0 a2=50 a3=7ffca2b88580 items=0 ppid=3430 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.790000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:20:36.800000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.800000 audit[3586]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca2b883e0 a2=28 a3=0 items=0 ppid=3430 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.800000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:20:36.800000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.800000 audit[3586]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca2b88410 a2=28 a3=0 items=0 ppid=3430 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.800000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:20:36.800000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.800000 audit[3586]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca2b88320 a2=28 a3=0 items=0 ppid=3430 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.800000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:20:36.800000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.800000 audit[3586]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca2b88430 a2=28 a3=0 items=0 ppid=3430 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.800000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:20:36.800000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.800000 audit[3586]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca2b88410 a2=28 a3=0 items=0 ppid=3430 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.800000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:20:36.800000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.800000 audit[3586]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca2b88400 a2=28 a3=0 items=0 ppid=3430 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.800000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:20:36.800000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.800000 audit[3586]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca2b88430 a2=28 a3=0 items=0 ppid=3430 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.800000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:20:36.800000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.800000 audit[3586]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca2b88410 a2=28 a3=0 items=0 ppid=3430 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.800000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:20:36.800000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.800000 audit[3586]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca2b88430 a2=28 a3=0 items=0 ppid=3430 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.800000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:20:36.800000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.800000 audit[3586]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca2b88400 a2=28 a3=0 items=0 ppid=3430 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.800000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:20:36.800000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.800000 audit[3586]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca2b88470 a2=28 a3=0 items=0 ppid=3430 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.800000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:20:36.800000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.800000 audit[3586]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffca2b88220 a2=50 a3=1 items=0 ppid=3430 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.800000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:20:36.800000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.800000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.800000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.800000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.800000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.800000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.800000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.800000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.800000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.800000 audit: BPF prog-id=152 op=LOAD May 15 09:20:36.800000 audit[3586]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffca2b88220 a2=94 a3=5 items=0 ppid=3430 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.800000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:20:36.800000 audit: BPF prog-id=152 op=UNLOAD May 15 09:20:36.800000 audit[3586]: AVC avc: denied { perfmon } for pid=3586 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.800000 audit[3586]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffca2b882d0 a2=50 a3=1 items=0 ppid=3430 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.800000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 09:20:36.820000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit: BPF prog-id=153 op=LOAD May 15 09:20:36.820000 audit[3589]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffefe664a60 a2=98 a3=1999999999999999 items=0 ppid=3430 pid=3589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.820000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 09:20:36.820000 audit: BPF prog-id=153 op=UNLOAD May 15 09:20:36.820000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit: BPF prog-id=154 op=LOAD May 15 09:20:36.820000 audit[3589]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffefe664940 a2=74 a3=ffff items=0 ppid=3430 pid=3589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.820000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 09:20:36.820000 audit: BPF prog-id=154 op=UNLOAD May 15 09:20:36.820000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.820000 audit: BPF prog-id=155 op=LOAD May 15 09:20:36.820000 audit[3589]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffefe664980 a2=40 a3=7ffefe664b60 items=0 ppid=3430 pid=3589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.820000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 09:20:36.820000 audit: BPF prog-id=155 op=UNLOAD May 15 09:20:36.959185 systemd-networkd[990]: vxlan.calico: Link UP May 15 09:20:36.959193 systemd-networkd[990]: vxlan.calico: Gained carrier May 15 09:20:36.981000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.981000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.981000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.981000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.981000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.981000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.981000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.981000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.981000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.981000 audit: BPF prog-id=156 op=LOAD May 15 09:20:36.981000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe96312bc0 a2=98 a3=100 items=0 ppid=3430 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.981000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:20:36.984000 audit: BPF prog-id=156 op=UNLOAD May 15 09:20:36.984000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.984000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.984000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.984000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.984000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.984000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.984000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.984000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.984000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.984000 audit: BPF prog-id=157 op=LOAD May 15 09:20:36.984000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe963129d0 a2=74 a3=540051 items=0 ppid=3430 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.984000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:20:36.984000 audit: BPF prog-id=157 op=UNLOAD May 15 09:20:36.984000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.984000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.984000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.984000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.984000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.984000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.984000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.984000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.984000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.984000 audit: BPF prog-id=158 op=LOAD May 15 09:20:36.984000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe96312a00 a2=94 a3=2 items=0 ppid=3430 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.984000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:20:36.985000 audit: BPF prog-id=158 op=UNLOAD May 15 09:20:36.985000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.985000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe963128d0 a2=28 a3=0 items=0 ppid=3430 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.985000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:20:36.985000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.985000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe96312900 a2=28 a3=0 items=0 ppid=3430 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.985000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:20:36.985000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.985000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe96312810 a2=28 a3=0 items=0 ppid=3430 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.985000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:20:36.985000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.985000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe96312920 a2=28 a3=0 items=0 ppid=3430 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.985000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:20:36.985000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.985000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe96312900 a2=28 a3=0 items=0 ppid=3430 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.985000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:20:36.986000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.986000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe963128f0 a2=28 a3=0 items=0 ppid=3430 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:20:36.986000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.986000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe96312920 a2=28 a3=0 items=0 ppid=3430 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:20:36.986000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.986000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe96312900 a2=28 a3=0 items=0 ppid=3430 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:20:36.986000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.986000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe96312920 a2=28 a3=0 items=0 ppid=3430 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:20:36.986000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.986000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe963128f0 a2=28 a3=0 items=0 ppid=3430 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:20:36.986000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.986000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe96312960 a2=28 a3=0 items=0 ppid=3430 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:20:36.986000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.986000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.986000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.986000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.986000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.986000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.986000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.986000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.986000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.986000 audit: BPF prog-id=159 op=LOAD May 15 09:20:36.986000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe963127d0 a2=40 a3=0 items=0 ppid=3430 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:20:36.986000 audit: BPF prog-id=159 op=UNLOAD May 15 09:20:36.987000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.987000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe963127c0 a2=50 a3=2800 items=0 ppid=3430 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.987000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:20:36.987000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.987000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe963127c0 a2=50 a3=2800 items=0 ppid=3430 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.987000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:20:36.987000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.987000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.987000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.987000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.987000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.987000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.987000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.987000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.987000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.987000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.987000 audit: BPF prog-id=160 op=LOAD May 15 09:20:36.987000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe96311fe0 a2=94 a3=2 items=0 ppid=3430 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.987000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:20:36.987000 audit: BPF prog-id=160 op=UNLOAD May 15 09:20:36.987000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.987000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.987000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.987000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.987000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.987000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.987000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.987000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.987000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.987000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.987000 audit: BPF prog-id=161 op=LOAD May 15 09:20:36.987000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe963120e0 a2=94 a3=30 items=0 ppid=3430 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.987000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit: BPF prog-id=162 op=LOAD May 15 09:20:36.990000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd0881e0f0 a2=98 a3=0 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.990000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:36.990000 audit: BPF prog-id=162 op=UNLOAD May 15 09:20:36.990000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit: BPF prog-id=163 op=LOAD May 15 09:20:36.990000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd0881ded0 a2=74 a3=540051 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.990000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:36.990000 audit: BPF prog-id=163 op=UNLOAD May 15 09:20:36.990000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:36.990000 audit: BPF prog-id=164 op=LOAD May 15 09:20:36.990000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd0881df00 a2=94 a3=2 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:36.990000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:36.990000 audit: BPF prog-id=164 op=UNLOAD May 15 09:20:37.119000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.119000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.119000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.119000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.119000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.119000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.119000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.119000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.119000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.119000 audit: BPF prog-id=165 op=LOAD May 15 09:20:37.119000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd0881ddc0 a2=40 a3=1 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:37.120000 audit: BPF prog-id=165 op=UNLOAD May 15 09:20:37.120000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.120000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd0881de90 a2=50 a3=7ffd0881df70 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.120000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:37.129000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.129000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd0881ddd0 a2=28 a3=0 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.129000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:37.129000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.129000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd0881de00 a2=28 a3=0 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.129000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:37.129000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.129000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd0881dd10 a2=28 a3=0 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.129000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:37.129000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.129000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd0881de20 a2=28 a3=0 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.129000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:37.129000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.129000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd0881de00 a2=28 a3=0 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.129000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:37.129000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.129000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd0881ddf0 a2=28 a3=0 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.129000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:37.129000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.129000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd0881de20 a2=28 a3=0 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.129000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:37.129000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.129000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd0881de00 a2=28 a3=0 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.129000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:37.129000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.129000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd0881de20 a2=28 a3=0 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.129000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:37.130000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.130000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd0881ddf0 a2=28 a3=0 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.130000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:37.130000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.130000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd0881de60 a2=28 a3=0 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.130000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:37.130000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.130000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd0881dc10 a2=50 a3=1 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.130000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:37.130000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.130000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.130000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.130000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.130000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.130000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.130000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.130000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.130000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.130000 audit: BPF prog-id=166 op=LOAD May 15 09:20:37.130000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd0881dc10 a2=94 a3=5 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.130000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:37.130000 audit: BPF prog-id=166 op=UNLOAD May 15 09:20:37.130000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.130000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd0881dcc0 a2=50 a3=1 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.130000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:37.130000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.130000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd0881dde0 a2=4 a3=38 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.130000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:37.130000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.130000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.130000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.130000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.130000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.130000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.130000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.130000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.130000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.130000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.130000 audit[3620]: AVC avc: denied { confidentiality } for pid=3620 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:20:37.130000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd0881de30 a2=94 a3=6 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.130000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:37.131000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.131000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.131000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.131000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.131000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.131000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.131000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.131000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.131000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.131000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.131000 audit[3620]: AVC avc: denied { confidentiality } for pid=3620 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 09:20:37.131000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd0881d5e0 a2=94 a3=83 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.131000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:37.131000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.131000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.131000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.131000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.131000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.131000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.131000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.131000 audit[3620]: AVC avc: denied { perfmon } for pid=3620 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.131000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd0881d5e0 a2=94 a3=83 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.131000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:37.132000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.132000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd0881f020 a2=10 a3=f0f1 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:37.132000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.132000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd0881eec0 a2=10 a3=3 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:37.132000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.132000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd0881ee60 a2=10 a3=3 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:37.132000 audit[3620]: AVC avc: denied { bpf } for pid=3620 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.132000 audit[3620]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd0881ee60 a2=10 a3=7 items=0 ppid=3430 pid=3620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 09:20:37.139000 audit: BPF prog-id=161 op=UNLOAD May 15 09:20:37.452000 audit[3648]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3648 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 09:20:37.452000 audit[3648]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe91c4a7d0 a2=0 a3=7ffe91c4a7bc items=0 ppid=3430 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.452000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 09:20:37.520000 audit[3647]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3647 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 09:20:37.520000 audit[3647]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff746ff7f0 a2=0 a3=7fff746ff7dc items=0 ppid=3430 pid=3647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.520000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 09:20:37.524000 audit[3650]: NETFILTER_CFG table=filter:99 family=2 entries=131 op=nft_register_chain pid=3650 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 09:20:37.524000 audit[3650]: SYSCALL arch=c000003e syscall=46 success=yes exit=73924 a0=3 a1=7fffae0c2e10 a2=0 a3=7fffae0c2dfc items=0 ppid=3430 pid=3650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.524000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 09:20:37.562000 audit[3646]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3646 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 09:20:37.562000 audit[3646]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd41211c10 a2=0 a3=7ffd41211bfc items=0 ppid=3430 pid=3646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.562000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 09:20:37.880697 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5519959c715: link becomes ready May 15 09:20:37.882727 systemd-networkd[990]: cali5519959c715: Link UP May 15 09:20:37.882940 systemd-networkd[990]: cali5519959c715: Gained carrier May 15 09:20:37.904222 env[1156]: 2025-05-15 09:20:37.757 [INFO][3660] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-eth0 calico-apiserver-75fb8c8f64- calico-apiserver b69c064a-8357-4600-9040-f9f9b30500a0 776 0 2025-05-15 09:20:02 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:75fb8c8f64 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-7-n-1f13e4db17.novalocal calico-apiserver-75fb8c8f64-z6k6g eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali5519959c715 [] []}} ContainerID="d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b" Namespace="calico-apiserver" Pod="calico-apiserver-75fb8c8f64-z6k6g" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-" May 15 09:20:37.904222 env[1156]: 2025-05-15 09:20:37.757 [INFO][3660] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b" Namespace="calico-apiserver" Pod="calico-apiserver-75fb8c8f64-z6k6g" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-eth0" May 15 09:20:37.904222 env[1156]: 2025-05-15 09:20:37.803 [INFO][3687] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b" HandleID="k8s-pod-network.d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-eth0" May 15 09:20:37.904222 env[1156]: 2025-05-15 09:20:37.822 [INFO][3687] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b" HandleID="k8s-pod-network.d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029eb40), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-7-n-1f13e4db17.novalocal", "pod":"calico-apiserver-75fb8c8f64-z6k6g", "timestamp":"2025-05-15 09:20:37.803690228 +0000 UTC"}, Hostname:"ci-3510-3-7-n-1f13e4db17.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 09:20:37.904222 env[1156]: 2025-05-15 09:20:37.823 [INFO][3687] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:20:37.904222 env[1156]: 2025-05-15 09:20:37.823 [INFO][3687] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:20:37.904222 env[1156]: 2025-05-15 09:20:37.823 [INFO][3687] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-1f13e4db17.novalocal' May 15 09:20:37.904222 env[1156]: 2025-05-15 09:20:37.826 [INFO][3687] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:37.904222 env[1156]: 2025-05-15 09:20:37.835 [INFO][3687] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:37.904222 env[1156]: 2025-05-15 09:20:37.841 [INFO][3687] ipam/ipam.go 489: Trying affinity for 192.168.26.64/26 host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:37.904222 env[1156]: 2025-05-15 09:20:37.845 [INFO][3687] ipam/ipam.go 155: Attempting to load block cidr=192.168.26.64/26 host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:37.904222 env[1156]: 2025-05-15 09:20:37.848 [INFO][3687] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.26.64/26 host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:37.904222 env[1156]: 2025-05-15 09:20:37.848 [INFO][3687] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.26.64/26 handle="k8s-pod-network.d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:37.904222 env[1156]: 2025-05-15 09:20:37.851 [INFO][3687] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b May 15 09:20:37.904222 env[1156]: 2025-05-15 09:20:37.857 [INFO][3687] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.26.64/26 handle="k8s-pod-network.d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:37.904222 env[1156]: 2025-05-15 09:20:37.873 [INFO][3687] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.26.68/26] block=192.168.26.64/26 handle="k8s-pod-network.d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:37.904222 env[1156]: 2025-05-15 09:20:37.873 [INFO][3687] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.26.68/26] handle="k8s-pod-network.d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:37.904222 env[1156]: 2025-05-15 09:20:37.873 [INFO][3687] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:20:37.904222 env[1156]: 2025-05-15 09:20:37.873 [INFO][3687] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.26.68/26] IPv6=[] ContainerID="d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b" HandleID="k8s-pod-network.d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-eth0" May 15 09:20:37.905222 env[1156]: 2025-05-15 09:20:37.876 [INFO][3660] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b" Namespace="calico-apiserver" Pod="calico-apiserver-75fb8c8f64-z6k6g" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-eth0", GenerateName:"calico-apiserver-75fb8c8f64-", Namespace:"calico-apiserver", SelfLink:"", UID:"b69c064a-8357-4600-9040-f9f9b30500a0", ResourceVersion:"776", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 20, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75fb8c8f64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1f13e4db17.novalocal", ContainerID:"", Pod:"calico-apiserver-75fb8c8f64-z6k6g", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.26.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5519959c715", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:20:37.905222 env[1156]: 2025-05-15 09:20:37.876 [INFO][3660] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.26.68/32] ContainerID="d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b" Namespace="calico-apiserver" Pod="calico-apiserver-75fb8c8f64-z6k6g" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-eth0" May 15 09:20:37.905222 env[1156]: 2025-05-15 09:20:37.876 [INFO][3660] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5519959c715 ContainerID="d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b" Namespace="calico-apiserver" Pod="calico-apiserver-75fb8c8f64-z6k6g" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-eth0" May 15 09:20:37.905222 env[1156]: 2025-05-15 09:20:37.880 [INFO][3660] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b" Namespace="calico-apiserver" Pod="calico-apiserver-75fb8c8f64-z6k6g" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-eth0" May 15 09:20:37.905222 env[1156]: 2025-05-15 09:20:37.884 [INFO][3660] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b" Namespace="calico-apiserver" Pod="calico-apiserver-75fb8c8f64-z6k6g" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-eth0", GenerateName:"calico-apiserver-75fb8c8f64-", Namespace:"calico-apiserver", SelfLink:"", UID:"b69c064a-8357-4600-9040-f9f9b30500a0", ResourceVersion:"776", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 20, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75fb8c8f64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1f13e4db17.novalocal", ContainerID:"d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b", Pod:"calico-apiserver-75fb8c8f64-z6k6g", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.26.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5519959c715", MAC:"9a:e1:e0:d3:ee:11", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:20:37.905222 env[1156]: 2025-05-15 09:20:37.899 [INFO][3660] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b" Namespace="calico-apiserver" Pod="calico-apiserver-75fb8c8f64-z6k6g" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-eth0" May 15 09:20:37.924330 env[1156]: time="2025-05-15T09:20:37.924063961Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 09:20:37.924330 env[1156]: time="2025-05-15T09:20:37.924122451Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 09:20:37.924330 env[1156]: time="2025-05-15T09:20:37.924136417Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 09:20:37.924733 env[1156]: time="2025-05-15T09:20:37.924353926Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b pid=3720 runtime=io.containerd.runc.v2 May 15 09:20:37.934000 audit[3725]: NETFILTER_CFG table=filter:101 family=2 entries=42 op=nft_register_chain pid=3725 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 09:20:37.934000 audit[3725]: SYSCALL arch=c000003e syscall=46 success=yes exit=22704 a0=3 a1=7ffc7c535e40 a2=0 a3=7ffc7c535e2c items=0 ppid=3430 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.934000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 09:20:37.953016 systemd[1]: Started cri-containerd-d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b.scope. May 15 09:20:37.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.984000 audit: BPF prog-id=167 op=LOAD May 15 09:20:37.985000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3720 pid=3730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439393139366465386462353239613662623235356531353164656433 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3720 pid=3730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439393139366465386462353239613662623235356531353164656433 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit: BPF prog-id=168 op=LOAD May 15 09:20:37.985000 audit[3730]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001f7eb0 items=0 ppid=3720 pid=3730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439393139366465386462353239613662623235356531353164656433 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit: BPF prog-id=169 op=LOAD May 15 09:20:37.985000 audit[3730]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001f7ef8 items=0 ppid=3720 pid=3730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439393139366465386462353239613662623235356531353164656433 May 15 09:20:37.985000 audit: BPF prog-id=169 op=UNLOAD May 15 09:20:37.985000 audit: BPF prog-id=168 op=UNLOAD May 15 09:20:37.985000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { perfmon } for pid=3730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit[3730]: AVC avc: denied { bpf } for pid=3730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:37.985000 audit: BPF prog-id=170 op=LOAD May 15 09:20:37.985000 audit[3730]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000374308 items=0 ppid=3720 pid=3730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:37.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439393139366465386462353239613662623235356531353164656433 May 15 09:20:37.997718 systemd-networkd[990]: cali56bf1e1b197: Link UP May 15 09:20:38.000613 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali56bf1e1b197: link becomes ready May 15 09:20:38.000421 systemd-networkd[990]: cali56bf1e1b197: Gained carrier May 15 09:20:38.029484 env[1156]: 2025-05-15 09:20:37.759 [INFO][3666] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-eth0 coredns-6f6b679f8f- kube-system 58ca787e-dacc-4065-9fb9-bd5f94da9491 777 0 2025-05-15 09:19:54 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-7-n-1f13e4db17.novalocal coredns-6f6b679f8f-vjn6s eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali56bf1e1b197 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456" Namespace="kube-system" Pod="coredns-6f6b679f8f-vjn6s" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-" May 15 09:20:38.029484 env[1156]: 2025-05-15 09:20:37.759 [INFO][3666] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456" Namespace="kube-system" Pod="coredns-6f6b679f8f-vjn6s" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-eth0" May 15 09:20:38.029484 env[1156]: 2025-05-15 09:20:37.827 [INFO][3693] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456" HandleID="k8s-pod-network.f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-eth0" May 15 09:20:38.029484 env[1156]: 2025-05-15 09:20:37.845 [INFO][3693] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456" HandleID="k8s-pod-network.f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000336f40), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-7-n-1f13e4db17.novalocal", "pod":"coredns-6f6b679f8f-vjn6s", "timestamp":"2025-05-15 09:20:37.827151726 +0000 UTC"}, Hostname:"ci-3510-3-7-n-1f13e4db17.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 09:20:38.029484 env[1156]: 2025-05-15 09:20:37.845 [INFO][3693] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:20:38.029484 env[1156]: 2025-05-15 09:20:37.873 [INFO][3693] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:20:38.029484 env[1156]: 2025-05-15 09:20:37.873 [INFO][3693] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-1f13e4db17.novalocal' May 15 09:20:38.029484 env[1156]: 2025-05-15 09:20:37.935 [INFO][3693] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:38.029484 env[1156]: 2025-05-15 09:20:37.947 [INFO][3693] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:38.029484 env[1156]: 2025-05-15 09:20:37.959 [INFO][3693] ipam/ipam.go 489: Trying affinity for 192.168.26.64/26 host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:38.029484 env[1156]: 2025-05-15 09:20:37.964 [INFO][3693] ipam/ipam.go 155: Attempting to load block cidr=192.168.26.64/26 host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:38.029484 env[1156]: 2025-05-15 09:20:37.969 [INFO][3693] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.26.64/26 host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:38.029484 env[1156]: 2025-05-15 09:20:37.969 [INFO][3693] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.26.64/26 handle="k8s-pod-network.f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:38.029484 env[1156]: 2025-05-15 09:20:37.973 [INFO][3693] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456 May 15 09:20:38.029484 env[1156]: 2025-05-15 09:20:37.979 [INFO][3693] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.26.64/26 handle="k8s-pod-network.f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:38.029484 env[1156]: 2025-05-15 09:20:37.993 [INFO][3693] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.26.69/26] block=192.168.26.64/26 handle="k8s-pod-network.f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:38.029484 env[1156]: 2025-05-15 09:20:37.993 [INFO][3693] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.26.69/26] handle="k8s-pod-network.f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:38.029484 env[1156]: 2025-05-15 09:20:37.993 [INFO][3693] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:20:38.029484 env[1156]: 2025-05-15 09:20:37.993 [INFO][3693] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.26.69/26] IPv6=[] ContainerID="f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456" HandleID="k8s-pod-network.f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-eth0" May 15 09:20:38.030362 env[1156]: 2025-05-15 09:20:37.995 [INFO][3666] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456" Namespace="kube-system" Pod="coredns-6f6b679f8f-vjn6s" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"58ca787e-dacc-4065-9fb9-bd5f94da9491", ResourceVersion:"777", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 19, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1f13e4db17.novalocal", ContainerID:"", Pod:"coredns-6f6b679f8f-vjn6s", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.26.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali56bf1e1b197", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:20:38.030362 env[1156]: 2025-05-15 09:20:37.995 [INFO][3666] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.26.69/32] ContainerID="f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456" Namespace="kube-system" Pod="coredns-6f6b679f8f-vjn6s" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-eth0" May 15 09:20:38.030362 env[1156]: 2025-05-15 09:20:37.995 [INFO][3666] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali56bf1e1b197 ContainerID="f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456" Namespace="kube-system" Pod="coredns-6f6b679f8f-vjn6s" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-eth0" May 15 09:20:38.030362 env[1156]: 2025-05-15 09:20:37.998 [INFO][3666] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456" Namespace="kube-system" Pod="coredns-6f6b679f8f-vjn6s" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-eth0" May 15 09:20:38.030362 env[1156]: 2025-05-15 09:20:38.001 [INFO][3666] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456" Namespace="kube-system" Pod="coredns-6f6b679f8f-vjn6s" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"58ca787e-dacc-4065-9fb9-bd5f94da9491", ResourceVersion:"777", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 19, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1f13e4db17.novalocal", ContainerID:"f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456", Pod:"coredns-6f6b679f8f-vjn6s", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.26.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali56bf1e1b197", MAC:"ca:3f:84:cf:58:49", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:20:38.030362 env[1156]: 2025-05-15 09:20:38.024 [INFO][3666] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456" Namespace="kube-system" Pod="coredns-6f6b679f8f-vjn6s" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-eth0" May 15 09:20:38.032645 env[1156]: time="2025-05-15T09:20:38.032597571Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75fb8c8f64-z6k6g,Uid:b69c064a-8357-4600-9040-f9f9b30500a0,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b\"" May 15 09:20:38.048000 audit[3767]: NETFILTER_CFG table=filter:102 family=2 entries=56 op=nft_register_chain pid=3767 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 09:20:38.048000 audit[3767]: SYSCALL arch=c000003e syscall=46 success=yes exit=26752 a0=3 a1=7ffd765671d0 a2=0 a3=7ffd765671bc items=0 ppid=3430 pid=3767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:38.048000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 09:20:38.057744 env[1156]: time="2025-05-15T09:20:38.057663002Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 09:20:38.058030 env[1156]: time="2025-05-15T09:20:38.057757921Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 09:20:38.058030 env[1156]: time="2025-05-15T09:20:38.057841858Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 09:20:38.059152 env[1156]: time="2025-05-15T09:20:38.058872726Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456 pid=3776 runtime=io.containerd.runc.v2 May 15 09:20:38.075868 systemd[1]: Started cri-containerd-f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456.scope. May 15 09:20:38.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.091000 audit: BPF prog-id=171 op=LOAD May 15 09:20:38.092000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3776 pid=3786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:38.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639636131616436366633663830333933343461386338656266346533 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3776 pid=3786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:38.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639636131616436366633663830333933343461386338656266346533 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit: BPF prog-id=172 op=LOAD May 15 09:20:38.092000 audit[3786]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024550 items=0 ppid=3776 pid=3786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:38.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639636131616436366633663830333933343461386338656266346533 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit: BPF prog-id=173 op=LOAD May 15 09:20:38.092000 audit[3786]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024598 items=0 ppid=3776 pid=3786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:38.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639636131616436366633663830333933343461386338656266346533 May 15 09:20:38.092000 audit: BPF prog-id=173 op=UNLOAD May 15 09:20:38.092000 audit: BPF prog-id=172 op=UNLOAD May 15 09:20:38.092000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { perfmon } for pid=3786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit[3786]: AVC avc: denied { bpf } for pid=3786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.092000 audit: BPF prog-id=174 op=LOAD May 15 09:20:38.092000 audit[3786]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000249a8 items=0 ppid=3776 pid=3786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:38.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639636131616436366633663830333933343461386338656266346533 May 15 09:20:38.123414 env[1156]: time="2025-05-15T09:20:38.123369704Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-vjn6s,Uid:58ca787e-dacc-4065-9fb9-bd5f94da9491,Namespace:kube-system,Attempt:1,} returns sandbox id \"f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456\"" May 15 09:20:38.127140 env[1156]: time="2025-05-15T09:20:38.127099767Z" level=info msg="CreateContainer within sandbox \"f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 09:20:38.149941 env[1156]: time="2025-05-15T09:20:38.149817494Z" level=info msg="CreateContainer within sandbox \"f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"9b4956fcfaf3b68c43a2aa2ed95717af9071dbf352da710c5758798ab8e2d108\"" May 15 09:20:38.150906 env[1156]: time="2025-05-15T09:20:38.150863591Z" level=info msg="StartContainer for \"9b4956fcfaf3b68c43a2aa2ed95717af9071dbf352da710c5758798ab8e2d108\"" May 15 09:20:38.179129 systemd[1]: Started cri-containerd-9b4956fcfaf3b68c43a2aa2ed95717af9071dbf352da710c5758798ab8e2d108.scope. May 15 09:20:38.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.196000 audit: BPF prog-id=175 op=LOAD May 15 09:20:38.197000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.197000 audit[3816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3776 pid=3816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:38.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962343935366663666166336236386334336132616132656439353731 May 15 09:20:38.198000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.198000 audit[3816]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3776 pid=3816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:38.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962343935366663666166336236386334336132616132656439353731 May 15 09:20:38.198000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.198000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.198000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.198000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.198000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.198000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.198000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.198000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.198000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.198000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.198000 audit: BPF prog-id=176 op=LOAD May 15 09:20:38.198000 audit[3816]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000337260 items=0 ppid=3776 pid=3816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:38.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962343935366663666166336236386334336132616132656439353731 May 15 09:20:38.199000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.199000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.199000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.199000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.199000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.199000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.199000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.199000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.199000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.199000 audit: BPF prog-id=177 op=LOAD May 15 09:20:38.199000 audit[3816]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003372a8 items=0 ppid=3776 pid=3816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:38.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962343935366663666166336236386334336132616132656439353731 May 15 09:20:38.200000 audit: BPF prog-id=177 op=UNLOAD May 15 09:20:38.200000 audit: BPF prog-id=176 op=UNLOAD May 15 09:20:38.200000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.200000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.200000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.200000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.200000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.200000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.200000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.200000 audit[3816]: AVC avc: denied { perfmon } for pid=3816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.200000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.200000 audit[3816]: AVC avc: denied { bpf } for pid=3816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:38.200000 audit: BPF prog-id=178 op=LOAD May 15 09:20:38.200000 audit[3816]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003376b8 items=0 ppid=3776 pid=3816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:38.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962343935366663666166336236386334336132616132656439353731 May 15 09:20:38.221549 env[1156]: time="2025-05-15T09:20:38.221480484Z" level=info msg="StartContainer for \"9b4956fcfaf3b68c43a2aa2ed95717af9071dbf352da710c5758798ab8e2d108\" returns successfully" May 15 09:20:38.623894 systemd-networkd[990]: vxlan.calico: Gained IPv6LL May 15 09:20:38.694441 kubelet[1952]: I0515 09:20:38.694318 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-vjn6s" podStartSLOduration=44.694260869 podStartE2EDuration="44.694260869s" podCreationTimestamp="2025-05-15 09:19:54 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 09:20:38.66165901 +0000 UTC m=+50.632252981" watchObservedRunningTime="2025-05-15 09:20:38.694260869 +0000 UTC m=+50.664854840" May 15 09:20:38.786000 audit[3848]: NETFILTER_CFG table=filter:103 family=2 entries=16 op=nft_register_rule pid=3848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:20:38.786000 audit[3848]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe2efb6cf0 a2=0 a3=7ffe2efb6cdc items=0 ppid=2126 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:38.786000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:20:38.791000 audit[3848]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=3848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:20:38.791000 audit[3848]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe2efb6cf0 a2=0 a3=0 items=0 ppid=2126 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:38.791000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:20:38.804000 audit[3850]: NETFILTER_CFG table=filter:105 family=2 entries=13 op=nft_register_rule pid=3850 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:20:38.804000 audit[3850]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe9de83ba0 a2=0 a3=7ffe9de83b8c items=0 ppid=2126 pid=3850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:38.804000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:20:38.810000 audit[3850]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=3850 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:20:38.810000 audit[3850]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe9de83ba0 a2=0 a3=7ffe9de83b8c items=0 ppid=2126 pid=3850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:38.810000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:20:39.115801 systemd-networkd[990]: cali56bf1e1b197: Gained IPv6LL May 15 09:20:39.187754 env[1156]: time="2025-05-15T09:20:39.187490541Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:39.190852 env[1156]: time="2025-05-15T09:20:39.190797117Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:39.193689 env[1156]: time="2025-05-15T09:20:39.193653547Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:39.196636 env[1156]: time="2025-05-15T09:20:39.196580860Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:39.197289 env[1156]: time="2025-05-15T09:20:39.197232724Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 15 09:20:39.201655 env[1156]: time="2025-05-15T09:20:39.199978857Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 09:20:39.204108 env[1156]: time="2025-05-15T09:20:39.204059869Z" level=info msg="CreateContainer within sandbox \"5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 15 09:20:39.231306 env[1156]: time="2025-05-15T09:20:39.231266072Z" level=info msg="CreateContainer within sandbox \"5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"26ddaa91a85ac8dfd70c015206f6271902218b256b2ef0ea4c8b1c88d6ea7234\"" May 15 09:20:39.233277 env[1156]: time="2025-05-15T09:20:39.233201870Z" level=info msg="StartContainer for \"26ddaa91a85ac8dfd70c015206f6271902218b256b2ef0ea4c8b1c88d6ea7234\"" May 15 09:20:39.290063 systemd[1]: Started cri-containerd-26ddaa91a85ac8dfd70c015206f6271902218b256b2ef0ea4c8b1c88d6ea7234.scope. May 15 09:20:39.318000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.320178 kernel: kauditd_printk_skb: 974 callbacks suppressed May 15 09:20:39.320246 kernel: audit: type=1400 audit(1747300839.318:1233): avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.318000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00023d6b0 a2=3c a3=7f35123170a8 items=0 ppid=3251 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:39.331443 kernel: audit: type=1300 audit(1747300839.318:1233): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00023d6b0 a2=3c a3=7f35123170a8 items=0 ppid=3251 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:39.331503 kernel: audit: type=1327 audit(1747300839.318:1233): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236646461613931613835616338646664373063303135323036663632 May 15 09:20:39.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236646461613931613835616338646664373063303135323036663632 May 15 09:20:39.318000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.342108 kernel: audit: type=1400 audit(1747300839.318:1234): avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.342173 kernel: audit: type=1400 audit(1747300839.318:1234): avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.318000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.318000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.351348 kernel: audit: type=1400 audit(1747300839.318:1234): avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.318000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.356544 kernel: audit: type=1400 audit(1747300839.318:1234): avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.318000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.362608 kernel: audit: type=1400 audit(1747300839.318:1234): avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.318000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.318000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.372991 kernel: audit: type=1400 audit(1747300839.318:1234): avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.373487 kernel: audit: type=1400 audit(1747300839.318:1234): avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.318000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.318000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.318000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.318000 audit: BPF prog-id=179 op=LOAD May 15 09:20:39.318000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00023d9d8 a2=78 a3=c000159ba8 items=0 ppid=3251 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:39.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236646461613931613835616338646664373063303135323036663632 May 15 09:20:39.324000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.324000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.324000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.324000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.324000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.324000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.324000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.324000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.324000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.324000 audit: BPF prog-id=180 op=LOAD May 15 09:20:39.324000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00023d770 a2=78 a3=c000159bf8 items=0 ppid=3251 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:39.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236646461613931613835616338646664373063303135323036663632 May 15 09:20:39.336000 audit: BPF prog-id=180 op=UNLOAD May 15 09:20:39.337000 audit: BPF prog-id=179 op=UNLOAD May 15 09:20:39.337000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.337000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.337000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.337000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.337000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.337000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.337000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.337000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.337000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.337000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:39.337000 audit: BPF prog-id=181 op=LOAD May 15 09:20:39.337000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00023dc30 a2=78 a3=c000159c88 items=0 ppid=3251 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:39.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236646461613931613835616338646664373063303135323036663632 May 15 09:20:39.394231 env[1156]: time="2025-05-15T09:20:39.394162659Z" level=info msg="StartContainer for \"26ddaa91a85ac8dfd70c015206f6271902218b256b2ef0ea4c8b1c88d6ea7234\" returns successfully" May 15 09:20:39.647833 systemd-networkd[990]: cali5519959c715: Gained IPv6LL May 15 09:20:43.797000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:20:43.797000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0031e4140 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:20:43.797000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:20:43.797000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:20:43.797000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00323a510 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:20:43.797000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:20:44.174482 env[1156]: time="2025-05-15T09:20:44.174361823Z" level=info msg="StopPodSandbox for \"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\"" May 15 09:20:44.486229 env[1156]: 2025-05-15 09:20:44.430 [INFO][3907] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" May 15 09:20:44.486229 env[1156]: 2025-05-15 09:20:44.431 [INFO][3907] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" iface="eth0" netns="/var/run/netns/cni-6051c415-0325-bee9-08ae-8be6c17fdc5a" May 15 09:20:44.486229 env[1156]: 2025-05-15 09:20:44.431 [INFO][3907] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" iface="eth0" netns="/var/run/netns/cni-6051c415-0325-bee9-08ae-8be6c17fdc5a" May 15 09:20:44.486229 env[1156]: 2025-05-15 09:20:44.432 [INFO][3907] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" iface="eth0" netns="/var/run/netns/cni-6051c415-0325-bee9-08ae-8be6c17fdc5a" May 15 09:20:44.486229 env[1156]: 2025-05-15 09:20:44.432 [INFO][3907] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" May 15 09:20:44.486229 env[1156]: 2025-05-15 09:20:44.432 [INFO][3907] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" May 15 09:20:44.486229 env[1156]: 2025-05-15 09:20:44.467 [INFO][3914] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" HandleID="k8s-pod-network.499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-eth0" May 15 09:20:44.486229 env[1156]: 2025-05-15 09:20:44.468 [INFO][3914] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:20:44.486229 env[1156]: 2025-05-15 09:20:44.468 [INFO][3914] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:20:44.486229 env[1156]: 2025-05-15 09:20:44.478 [WARNING][3914] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" HandleID="k8s-pod-network.499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-eth0" May 15 09:20:44.486229 env[1156]: 2025-05-15 09:20:44.478 [INFO][3914] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" HandleID="k8s-pod-network.499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-eth0" May 15 09:20:44.486229 env[1156]: 2025-05-15 09:20:44.480 [INFO][3914] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:20:44.486229 env[1156]: 2025-05-15 09:20:44.482 [INFO][3907] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" May 15 09:20:44.485952 systemd[1]: run-netns-cni\x2d6051c415\x2d0325\x2dbee9\x2d08ae\x2d8be6c17fdc5a.mount: Deactivated successfully. May 15 09:20:44.487098 env[1156]: time="2025-05-15T09:20:44.487058980Z" level=info msg="TearDown network for sandbox \"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\" successfully" May 15 09:20:44.487188 env[1156]: time="2025-05-15T09:20:44.487166842Z" level=info msg="StopPodSandbox for \"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\" returns successfully" May 15 09:20:44.488090 env[1156]: time="2025-05-15T09:20:44.488056163Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-nh2z8,Uid:b8006dac-3d47-4240-90f3-f7871027a257,Namespace:kube-system,Attempt:1,}" May 15 09:20:44.555413 kernel: kauditd_printk_skb: 39 callbacks suppressed May 15 09:20:44.555598 kernel: audit: type=1400 audit(1747300844.545:1241): avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:20:44.545000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:20:44.545000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00a0a2e40 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:20:44.564657 kernel: audit: type=1300 audit(1747300844.545:1241): arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00a0a2e40 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:20:44.564744 kernel: audit: type=1327 audit(1747300844.545:1241): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:20:44.545000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:20:44.562000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:20:44.578550 kernel: audit: type=1400 audit(1747300844.562:1242): avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:20:44.578621 kernel: audit: type=1300 audit(1747300844.562:1242): arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00a0a2ed0 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:20:44.562000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00a0a2ed0 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:20:44.562000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:20:44.599579 kernel: audit: type=1327 audit(1747300844.562:1242): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:20:44.562000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:20:44.562000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00a048300 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:20:44.615236 kernel: audit: type=1400 audit(1747300844.562:1243): avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:20:44.615341 kernel: audit: type=1300 audit(1747300844.562:1243): arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00a048300 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:20:44.562000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:20:44.622266 kernel: audit: type=1327 audit(1747300844.562:1243): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:20:44.562000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:20:44.628796 kernel: audit: type=1400 audit(1747300844.562:1244): avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:20:44.562000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00a0a2f30 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:20:44.562000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:20:44.562000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:20:44.562000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c009bb7ec0 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:20:44.562000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:20:44.570000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:20:44.570000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00992e020 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:20:44.570000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:20:44.749673 systemd-networkd[990]: cali3e1f0a72821: Link UP May 15 09:20:44.753640 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 09:20:44.753770 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3e1f0a72821: link becomes ready May 15 09:20:44.755845 systemd-networkd[990]: cali3e1f0a72821: Gained carrier May 15 09:20:44.795061 env[1156]: 2025-05-15 09:20:44.642 [INFO][3921] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-eth0 coredns-6f6b679f8f- kube-system b8006dac-3d47-4240-90f3-f7871027a257 816 0 2025-05-15 09:19:54 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-7-n-1f13e4db17.novalocal coredns-6f6b679f8f-nh2z8 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali3e1f0a72821 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f" Namespace="kube-system" Pod="coredns-6f6b679f8f-nh2z8" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-" May 15 09:20:44.795061 env[1156]: 2025-05-15 09:20:44.642 [INFO][3921] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f" Namespace="kube-system" Pod="coredns-6f6b679f8f-nh2z8" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-eth0" May 15 09:20:44.795061 env[1156]: 2025-05-15 09:20:44.687 [INFO][3934] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f" HandleID="k8s-pod-network.01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-eth0" May 15 09:20:44.795061 env[1156]: 2025-05-15 09:20:44.703 [INFO][3934] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f" HandleID="k8s-pod-network.01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000308ba0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-7-n-1f13e4db17.novalocal", "pod":"coredns-6f6b679f8f-nh2z8", "timestamp":"2025-05-15 09:20:44.686996099 +0000 UTC"}, Hostname:"ci-3510-3-7-n-1f13e4db17.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 09:20:44.795061 env[1156]: 2025-05-15 09:20:44.703 [INFO][3934] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:20:44.795061 env[1156]: 2025-05-15 09:20:44.703 [INFO][3934] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:20:44.795061 env[1156]: 2025-05-15 09:20:44.703 [INFO][3934] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-1f13e4db17.novalocal' May 15 09:20:44.795061 env[1156]: 2025-05-15 09:20:44.706 [INFO][3934] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:44.795061 env[1156]: 2025-05-15 09:20:44.711 [INFO][3934] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:44.795061 env[1156]: 2025-05-15 09:20:44.719 [INFO][3934] ipam/ipam.go 489: Trying affinity for 192.168.26.64/26 host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:44.795061 env[1156]: 2025-05-15 09:20:44.721 [INFO][3934] ipam/ipam.go 155: Attempting to load block cidr=192.168.26.64/26 host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:44.795061 env[1156]: 2025-05-15 09:20:44.725 [INFO][3934] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.26.64/26 host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:44.795061 env[1156]: 2025-05-15 09:20:44.725 [INFO][3934] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.26.64/26 handle="k8s-pod-network.01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:44.795061 env[1156]: 2025-05-15 09:20:44.727 [INFO][3934] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f May 15 09:20:44.795061 env[1156]: 2025-05-15 09:20:44.733 [INFO][3934] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.26.64/26 handle="k8s-pod-network.01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:44.795061 env[1156]: 2025-05-15 09:20:44.743 [INFO][3934] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.26.70/26] block=192.168.26.64/26 handle="k8s-pod-network.01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:44.795061 env[1156]: 2025-05-15 09:20:44.743 [INFO][3934] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.26.70/26] handle="k8s-pod-network.01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f" host="ci-3510-3-7-n-1f13e4db17.novalocal" May 15 09:20:44.795061 env[1156]: 2025-05-15 09:20:44.743 [INFO][3934] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:20:44.795061 env[1156]: 2025-05-15 09:20:44.744 [INFO][3934] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.26.70/26] IPv6=[] ContainerID="01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f" HandleID="k8s-pod-network.01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-eth0" May 15 09:20:44.795930 env[1156]: 2025-05-15 09:20:44.745 [INFO][3921] cni-plugin/k8s.go 386: Populated endpoint ContainerID="01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f" Namespace="kube-system" Pod="coredns-6f6b679f8f-nh2z8" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"b8006dac-3d47-4240-90f3-f7871027a257", ResourceVersion:"816", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 19, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1f13e4db17.novalocal", ContainerID:"", Pod:"coredns-6f6b679f8f-nh2z8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.26.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3e1f0a72821", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:20:44.795930 env[1156]: 2025-05-15 09:20:44.745 [INFO][3921] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.26.70/32] ContainerID="01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f" Namespace="kube-system" Pod="coredns-6f6b679f8f-nh2z8" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-eth0" May 15 09:20:44.795930 env[1156]: 2025-05-15 09:20:44.746 [INFO][3921] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3e1f0a72821 ContainerID="01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f" Namespace="kube-system" Pod="coredns-6f6b679f8f-nh2z8" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-eth0" May 15 09:20:44.795930 env[1156]: 2025-05-15 09:20:44.756 [INFO][3921] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f" Namespace="kube-system" Pod="coredns-6f6b679f8f-nh2z8" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-eth0" May 15 09:20:44.795930 env[1156]: 2025-05-15 09:20:44.757 [INFO][3921] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f" Namespace="kube-system" Pod="coredns-6f6b679f8f-nh2z8" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"b8006dac-3d47-4240-90f3-f7871027a257", ResourceVersion:"816", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 19, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1f13e4db17.novalocal", ContainerID:"01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f", Pod:"coredns-6f6b679f8f-nh2z8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.26.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3e1f0a72821", MAC:"12:24:fa:c6:08:75", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:20:44.795930 env[1156]: 2025-05-15 09:20:44.780 [INFO][3921] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f" Namespace="kube-system" Pod="coredns-6f6b679f8f-nh2z8" WorkloadEndpoint="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-eth0" May 15 09:20:44.803000 audit[3950]: NETFILTER_CFG table=filter:107 family=2 entries=42 op=nft_register_chain pid=3950 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 09:20:44.803000 audit[3950]: SYSCALL arch=c000003e syscall=46 success=yes exit=20580 a0=3 a1=7fff33c2c370 a2=0 a3=7fff33c2c35c items=0 ppid=3430 pid=3950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:44.803000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 09:20:44.824836 env[1156]: time="2025-05-15T09:20:44.824771911Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 09:20:44.824997 env[1156]: time="2025-05-15T09:20:44.824819049Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 09:20:44.824997 env[1156]: time="2025-05-15T09:20:44.824833807Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 09:20:44.824997 env[1156]: time="2025-05-15T09:20:44.824952400Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f pid=3964 runtime=io.containerd.runc.v2 May 15 09:20:44.866007 systemd[1]: Started cri-containerd-01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f.scope. May 15 09:20:44.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.923000 audit: BPF prog-id=182 op=LOAD May 15 09:20:44.923000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.923000 audit[3974]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3964 pid=3974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:44.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031646265323834646132383161333034613033613264363663656536 May 15 09:20:44.924000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.924000 audit[3974]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3964 pid=3974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:44.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031646265323834646132383161333034613033613264363663656536 May 15 09:20:44.924000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.924000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.924000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.924000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.924000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.924000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.924000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.924000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.924000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.924000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.924000 audit: BPF prog-id=183 op=LOAD May 15 09:20:44.924000 audit[3974]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000210370 items=0 ppid=3964 pid=3974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:44.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031646265323834646132383161333034613033613264363663656536 May 15 09:20:44.925000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.925000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.925000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.925000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.925000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.925000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.925000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.925000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.925000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.925000 audit: BPF prog-id=184 op=LOAD May 15 09:20:44.925000 audit[3974]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002103b8 items=0 ppid=3964 pid=3974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:44.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031646265323834646132383161333034613033613264363663656536 May 15 09:20:44.925000 audit: BPF prog-id=184 op=UNLOAD May 15 09:20:44.925000 audit: BPF prog-id=183 op=UNLOAD May 15 09:20:44.925000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.925000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.925000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.925000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.925000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.925000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.925000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.925000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.925000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.925000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:44.925000 audit: BPF prog-id=185 op=LOAD May 15 09:20:44.925000 audit[3974]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002107c8 items=0 ppid=3964 pid=3974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:44.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031646265323834646132383161333034613033613264363663656536 May 15 09:20:44.957995 env[1156]: time="2025-05-15T09:20:44.957950823Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-nh2z8,Uid:b8006dac-3d47-4240-90f3-f7871027a257,Namespace:kube-system,Attempt:1,} returns sandbox id \"01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f\"" May 15 09:20:44.961370 env[1156]: time="2025-05-15T09:20:44.961338890Z" level=info msg="CreateContainer within sandbox \"01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 09:20:44.983122 env[1156]: time="2025-05-15T09:20:44.983055686Z" level=info msg="CreateContainer within sandbox \"01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f300be724114b19f18f744ba04509916910e88d6546132b0abde648f239e1b05\"" May 15 09:20:44.985275 env[1156]: time="2025-05-15T09:20:44.985235863Z" level=info msg="StartContainer for \"f300be724114b19f18f744ba04509916910e88d6546132b0abde648f239e1b05\"" May 15 09:20:45.022658 systemd[1]: Started cri-containerd-f300be724114b19f18f744ba04509916910e88d6546132b0abde648f239e1b05.scope. May 15 09:20:45.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.054000 audit: BPF prog-id=186 op=LOAD May 15 09:20:45.055000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.055000 audit[4005]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3964 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:45.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633303062653732343131346231396631386637343462613034353039 May 15 09:20:45.055000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.055000 audit[4005]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3964 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:45.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633303062653732343131346231396631386637343462613034353039 May 15 09:20:45.055000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.055000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.055000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.055000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.055000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.055000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.055000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.055000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.055000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.055000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.055000 audit: BPF prog-id=187 op=LOAD May 15 09:20:45.055000 audit[4005]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002d7f10 items=0 ppid=3964 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:45.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633303062653732343131346231396631386637343462613034353039 May 15 09:20:45.055000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.055000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.055000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.055000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.055000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.055000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.055000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.055000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.055000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.055000 audit: BPF prog-id=188 op=LOAD May 15 09:20:45.055000 audit[4005]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002d7f58 items=0 ppid=3964 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:45.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633303062653732343131346231396631386637343462613034353039 May 15 09:20:45.057000 audit: BPF prog-id=188 op=UNLOAD May 15 09:20:45.057000 audit: BPF prog-id=187 op=UNLOAD May 15 09:20:45.057000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.057000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.057000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.057000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.057000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.057000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.057000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.057000 audit[4005]: AVC avc: denied { perfmon } for pid=4005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.057000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.057000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.057000 audit: BPF prog-id=189 op=LOAD May 15 09:20:45.057000 audit[4005]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000398368 items=0 ppid=3964 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:45.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633303062653732343131346231396631386637343462613034353039 May 15 09:20:45.083082 env[1156]: time="2025-05-15T09:20:45.083013826Z" level=info msg="StartContainer for \"f300be724114b19f18f744ba04509916910e88d6546132b0abde648f239e1b05\" returns successfully" May 15 09:20:45.090986 env[1156]: time="2025-05-15T09:20:45.090931946Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:45.094124 env[1156]: time="2025-05-15T09:20:45.094087026Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:45.098341 env[1156]: time="2025-05-15T09:20:45.098305173Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:45.103072 env[1156]: time="2025-05-15T09:20:45.103044590Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:45.104133 env[1156]: time="2025-05-15T09:20:45.104054358Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 15 09:20:45.107576 env[1156]: time="2025-05-15T09:20:45.107515343Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 15 09:20:45.109066 env[1156]: time="2025-05-15T09:20:45.108449568Z" level=info msg="CreateContainer within sandbox \"3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 09:20:45.135827 env[1156]: time="2025-05-15T09:20:45.135772037Z" level=info msg="CreateContainer within sandbox \"3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"5d8acd861254b5cf2ac642072381a39e54ce6f90f4f4f7570485a7ac0f03ae66\"" May 15 09:20:45.136929 env[1156]: time="2025-05-15T09:20:45.136903483Z" level=info msg="StartContainer for \"5d8acd861254b5cf2ac642072381a39e54ce6f90f4f4f7570485a7ac0f03ae66\"" May 15 09:20:45.171155 systemd[1]: Started cri-containerd-5d8acd861254b5cf2ac642072381a39e54ce6f90f4f4f7570485a7ac0f03ae66.scope. May 15 09:20:45.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit: BPF prog-id=190 op=LOAD May 15 09:20:45.191000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3296 pid=4041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:45.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564386163643836313235346235636632616336343230373233383161 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3296 pid=4041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:45.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564386163643836313235346235636632616336343230373233383161 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit: BPF prog-id=191 op=LOAD May 15 09:20:45.191000 audit[4041]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000235a10 items=0 ppid=3296 pid=4041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:45.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564386163643836313235346235636632616336343230373233383161 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit: BPF prog-id=192 op=LOAD May 15 09:20:45.191000 audit[4041]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000235a58 items=0 ppid=3296 pid=4041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:45.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564386163643836313235346235636632616336343230373233383161 May 15 09:20:45.191000 audit: BPF prog-id=192 op=UNLOAD May 15 09:20:45.191000 audit: BPF prog-id=191 op=UNLOAD May 15 09:20:45.191000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { perfmon } for pid=4041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit[4041]: AVC avc: denied { bpf } for pid=4041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:45.191000 audit: BPF prog-id=193 op=LOAD May 15 09:20:45.191000 audit[4041]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000235e68 items=0 ppid=3296 pid=4041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:45.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564386163643836313235346235636632616336343230373233383161 May 15 09:20:45.241136 env[1156]: time="2025-05-15T09:20:45.241082475Z" level=info msg="StartContainer for \"5d8acd861254b5cf2ac642072381a39e54ce6f90f4f4f7570485a7ac0f03ae66\" returns successfully" May 15 09:20:45.742157 kubelet[1952]: I0515 09:20:45.742083 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-nh2z8" podStartSLOduration=51.742045901 podStartE2EDuration="51.742045901s" podCreationTimestamp="2025-05-15 09:19:54 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 09:20:45.7123119 +0000 UTC m=+57.682905922" watchObservedRunningTime="2025-05-15 09:20:45.742045901 +0000 UTC m=+57.712639882" May 15 09:20:45.768227 kubelet[1952]: I0515 09:20:45.768153 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-75fb8c8f64-dsrx7" podStartSLOduration=34.028719697 podStartE2EDuration="43.768132929s" podCreationTimestamp="2025-05-15 09:20:02 +0000 UTC" firstStartedPulling="2025-05-15 09:20:35.366386256 +0000 UTC m=+47.336980237" lastFinishedPulling="2025-05-15 09:20:45.105799348 +0000 UTC m=+57.076393469" observedRunningTime="2025-05-15 09:20:45.743723935 +0000 UTC m=+57.714317907" watchObservedRunningTime="2025-05-15 09:20:45.768132929 +0000 UTC m=+57.738726910" May 15 09:20:45.816000 audit[4073]: NETFILTER_CFG table=filter:108 family=2 entries=10 op=nft_register_rule pid=4073 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:20:45.816000 audit[4073]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe30b3b050 a2=0 a3=7ffe30b3b03c items=0 ppid=2126 pid=4073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:45.816000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:20:45.822000 audit[4073]: NETFILTER_CFG table=nat:109 family=2 entries=44 op=nft_register_rule pid=4073 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:20:45.822000 audit[4073]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe30b3b050 a2=0 a3=7ffe30b3b03c items=0 ppid=2126 pid=4073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:45.822000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:20:45.835000 audit[4075]: NETFILTER_CFG table=filter:110 family=2 entries=10 op=nft_register_rule pid=4075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:20:45.835000 audit[4075]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc630658a0 a2=0 a3=7ffc6306588c items=0 ppid=2126 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:45.835000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:20:45.858000 audit[4075]: NETFILTER_CFG table=nat:111 family=2 entries=56 op=nft_register_chain pid=4075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:20:45.858000 audit[4075]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffc630658a0 a2=0 a3=7ffc6306588c items=0 ppid=2126 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:45.858000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:20:46.496692 systemd-networkd[990]: cali3e1f0a72821: Gained IPv6LL May 15 09:20:46.691663 kubelet[1952]: I0515 09:20:46.691607 1952 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 09:20:47.114000 audit[4052]: AVC avc: denied { watch } for pid=4052 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_09_20_20.3686309504/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c808,c879 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c808,c879 tclass=file permissive=0 May 15 09:20:47.114000 audit[4052]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000405060 a2=fc6 a3=0 items=0 ppid=3296 pid=4052 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c808,c879 key=(null) May 15 09:20:47.114000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 09:20:48.201562 env[1156]: time="2025-05-15T09:20:48.201458191Z" level=info msg="StopPodSandbox for \"3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6\"" May 15 09:20:48.399589 env[1156]: 2025-05-15 09:20:48.288 [WARNING][4099] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-eth0", GenerateName:"calico-apiserver-75fb8c8f64-", Namespace:"calico-apiserver", SelfLink:"", UID:"b69c064a-8357-4600-9040-f9f9b30500a0", ResourceVersion:"785", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 20, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75fb8c8f64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1f13e4db17.novalocal", ContainerID:"d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b", Pod:"calico-apiserver-75fb8c8f64-z6k6g", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.26.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5519959c715", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:20:48.399589 env[1156]: 2025-05-15 09:20:48.289 [INFO][4099] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" May 15 09:20:48.399589 env[1156]: 2025-05-15 09:20:48.289 [INFO][4099] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" iface="eth0" netns="" May 15 09:20:48.399589 env[1156]: 2025-05-15 09:20:48.289 [INFO][4099] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" May 15 09:20:48.399589 env[1156]: 2025-05-15 09:20:48.289 [INFO][4099] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" May 15 09:20:48.399589 env[1156]: 2025-05-15 09:20:48.368 [INFO][4106] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" HandleID="k8s-pod-network.3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-eth0" May 15 09:20:48.399589 env[1156]: 2025-05-15 09:20:48.368 [INFO][4106] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:20:48.399589 env[1156]: 2025-05-15 09:20:48.369 [INFO][4106] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:20:48.399589 env[1156]: 2025-05-15 09:20:48.393 [WARNING][4106] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" HandleID="k8s-pod-network.3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-eth0" May 15 09:20:48.399589 env[1156]: 2025-05-15 09:20:48.394 [INFO][4106] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" HandleID="k8s-pod-network.3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-eth0" May 15 09:20:48.399589 env[1156]: 2025-05-15 09:20:48.396 [INFO][4106] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:20:48.399589 env[1156]: 2025-05-15 09:20:48.398 [INFO][4099] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" May 15 09:20:48.401143 env[1156]: time="2025-05-15T09:20:48.399578284Z" level=info msg="TearDown network for sandbox \"3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6\" successfully" May 15 09:20:48.401143 env[1156]: time="2025-05-15T09:20:48.399685385Z" level=info msg="StopPodSandbox for \"3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6\" returns successfully" May 15 09:20:48.401143 env[1156]: time="2025-05-15T09:20:48.400644077Z" level=info msg="RemovePodSandbox for \"3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6\"" May 15 09:20:48.401143 env[1156]: time="2025-05-15T09:20:48.400692277Z" level=info msg="Forcibly stopping sandbox \"3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6\"" May 15 09:20:48.506000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:20:48.506000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0031e5e00 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:20:48.506000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:20:48.506000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:20:48.506000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002598940 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:20:48.506000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:20:48.509000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:20:48.509000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0031e5fa0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:20:48.509000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:20:48.509000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:20:48.509000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002598b60 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:20:48.509000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:20:48.607871 env[1156]: 2025-05-15 09:20:48.502 [WARNING][4125] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-eth0", GenerateName:"calico-apiserver-75fb8c8f64-", Namespace:"calico-apiserver", SelfLink:"", UID:"b69c064a-8357-4600-9040-f9f9b30500a0", ResourceVersion:"785", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 20, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75fb8c8f64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1f13e4db17.novalocal", ContainerID:"d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b", Pod:"calico-apiserver-75fb8c8f64-z6k6g", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.26.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5519959c715", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:20:48.607871 env[1156]: 2025-05-15 09:20:48.504 [INFO][4125] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" May 15 09:20:48.607871 env[1156]: 2025-05-15 09:20:48.504 [INFO][4125] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" iface="eth0" netns="" May 15 09:20:48.607871 env[1156]: 2025-05-15 09:20:48.504 [INFO][4125] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" May 15 09:20:48.607871 env[1156]: 2025-05-15 09:20:48.505 [INFO][4125] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" May 15 09:20:48.607871 env[1156]: 2025-05-15 09:20:48.582 [INFO][4132] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" HandleID="k8s-pod-network.3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-eth0" May 15 09:20:48.607871 env[1156]: 2025-05-15 09:20:48.583 [INFO][4132] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:20:48.607871 env[1156]: 2025-05-15 09:20:48.583 [INFO][4132] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:20:48.607871 env[1156]: 2025-05-15 09:20:48.594 [WARNING][4132] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" HandleID="k8s-pod-network.3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-eth0" May 15 09:20:48.607871 env[1156]: 2025-05-15 09:20:48.594 [INFO][4132] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" HandleID="k8s-pod-network.3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--z6k6g-eth0" May 15 09:20:48.607871 env[1156]: 2025-05-15 09:20:48.604 [INFO][4132] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:20:48.607871 env[1156]: 2025-05-15 09:20:48.606 [INFO][4125] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6" May 15 09:20:48.608812 env[1156]: time="2025-05-15T09:20:48.607903603Z" level=info msg="TearDown network for sandbox \"3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6\" successfully" May 15 09:20:48.616821 env[1156]: time="2025-05-15T09:20:48.616772921Z" level=info msg="RemovePodSandbox \"3389c0c196e5b37164058c180fa1f558322588b02eb2f27e03ef4538235a8df6\" returns successfully" May 15 09:20:48.617968 env[1156]: time="2025-05-15T09:20:48.617924835Z" level=info msg="StopPodSandbox for \"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\"" May 15 09:20:48.747687 env[1156]: 2025-05-15 09:20:48.677 [WARNING][4152] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"b8006dac-3d47-4240-90f3-f7871027a257", ResourceVersion:"835", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 19, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1f13e4db17.novalocal", ContainerID:"01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f", Pod:"coredns-6f6b679f8f-nh2z8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.26.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3e1f0a72821", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:20:48.747687 env[1156]: 2025-05-15 09:20:48.678 [INFO][4152] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" May 15 09:20:48.747687 env[1156]: 2025-05-15 09:20:48.678 [INFO][4152] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" iface="eth0" netns="" May 15 09:20:48.747687 env[1156]: 2025-05-15 09:20:48.678 [INFO][4152] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" May 15 09:20:48.747687 env[1156]: 2025-05-15 09:20:48.678 [INFO][4152] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" May 15 09:20:48.747687 env[1156]: 2025-05-15 09:20:48.718 [INFO][4159] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" HandleID="k8s-pod-network.499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-eth0" May 15 09:20:48.747687 env[1156]: 2025-05-15 09:20:48.718 [INFO][4159] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:20:48.747687 env[1156]: 2025-05-15 09:20:48.718 [INFO][4159] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:20:48.747687 env[1156]: 2025-05-15 09:20:48.733 [WARNING][4159] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" HandleID="k8s-pod-network.499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-eth0" May 15 09:20:48.747687 env[1156]: 2025-05-15 09:20:48.734 [INFO][4159] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" HandleID="k8s-pod-network.499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-eth0" May 15 09:20:48.747687 env[1156]: 2025-05-15 09:20:48.744 [INFO][4159] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:20:48.747687 env[1156]: 2025-05-15 09:20:48.746 [INFO][4152] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" May 15 09:20:48.748720 env[1156]: time="2025-05-15T09:20:48.747711577Z" level=info msg="TearDown network for sandbox \"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\" successfully" May 15 09:20:48.748720 env[1156]: time="2025-05-15T09:20:48.747747174Z" level=info msg="StopPodSandbox for \"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\" returns successfully" May 15 09:20:48.748720 env[1156]: time="2025-05-15T09:20:48.748285666Z" level=info msg="RemovePodSandbox for \"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\"" May 15 09:20:48.748720 env[1156]: time="2025-05-15T09:20:48.748322114Z" level=info msg="Forcibly stopping sandbox \"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\"" May 15 09:20:48.895763 env[1156]: 2025-05-15 09:20:48.821 [WARNING][4178] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"b8006dac-3d47-4240-90f3-f7871027a257", ResourceVersion:"835", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 19, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1f13e4db17.novalocal", ContainerID:"01dbe284da281a304a03a2d66cee6a01ee2f50f950fd2cbe4a9297af6576246f", Pod:"coredns-6f6b679f8f-nh2z8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.26.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3e1f0a72821", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:20:48.895763 env[1156]: 2025-05-15 09:20:48.822 [INFO][4178] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" May 15 09:20:48.895763 env[1156]: 2025-05-15 09:20:48.822 [INFO][4178] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" iface="eth0" netns="" May 15 09:20:48.895763 env[1156]: 2025-05-15 09:20:48.822 [INFO][4178] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" May 15 09:20:48.895763 env[1156]: 2025-05-15 09:20:48.822 [INFO][4178] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" May 15 09:20:48.895763 env[1156]: 2025-05-15 09:20:48.878 [INFO][4185] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" HandleID="k8s-pod-network.499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-eth0" May 15 09:20:48.895763 env[1156]: 2025-05-15 09:20:48.879 [INFO][4185] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:20:48.895763 env[1156]: 2025-05-15 09:20:48.879 [INFO][4185] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:20:48.895763 env[1156]: 2025-05-15 09:20:48.889 [WARNING][4185] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" HandleID="k8s-pod-network.499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-eth0" May 15 09:20:48.895763 env[1156]: 2025-05-15 09:20:48.889 [INFO][4185] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" HandleID="k8s-pod-network.499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--nh2z8-eth0" May 15 09:20:48.895763 env[1156]: 2025-05-15 09:20:48.892 [INFO][4185] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:20:48.895763 env[1156]: 2025-05-15 09:20:48.894 [INFO][4178] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a" May 15 09:20:48.896813 env[1156]: time="2025-05-15T09:20:48.896769964Z" level=info msg="TearDown network for sandbox \"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\" successfully" May 15 09:20:48.903137 env[1156]: time="2025-05-15T09:20:48.903097995Z" level=info msg="RemovePodSandbox \"499e2e334b62073df4aed39138042c837baf8cf5310fe38a1cb1c48b4b5cce2a\" returns successfully" May 15 09:20:48.904118 env[1156]: time="2025-05-15T09:20:48.904091112Z" level=info msg="StopPodSandbox for \"a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b\"" May 15 09:20:49.037215 env[1156]: 2025-05-15 09:20:48.990 [WARNING][4205] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"58ca787e-dacc-4065-9fb9-bd5f94da9491", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 19, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1f13e4db17.novalocal", ContainerID:"f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456", Pod:"coredns-6f6b679f8f-vjn6s", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.26.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali56bf1e1b197", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:20:49.037215 env[1156]: 2025-05-15 09:20:48.992 [INFO][4205] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" May 15 09:20:49.037215 env[1156]: 2025-05-15 09:20:48.992 [INFO][4205] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" iface="eth0" netns="" May 15 09:20:49.037215 env[1156]: 2025-05-15 09:20:48.992 [INFO][4205] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" May 15 09:20:49.037215 env[1156]: 2025-05-15 09:20:48.992 [INFO][4205] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" May 15 09:20:49.037215 env[1156]: 2025-05-15 09:20:49.020 [INFO][4212] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" HandleID="k8s-pod-network.a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-eth0" May 15 09:20:49.037215 env[1156]: 2025-05-15 09:20:49.020 [INFO][4212] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:20:49.037215 env[1156]: 2025-05-15 09:20:49.020 [INFO][4212] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:20:49.037215 env[1156]: 2025-05-15 09:20:49.032 [WARNING][4212] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" HandleID="k8s-pod-network.a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-eth0" May 15 09:20:49.037215 env[1156]: 2025-05-15 09:20:49.032 [INFO][4212] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" HandleID="k8s-pod-network.a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-eth0" May 15 09:20:49.037215 env[1156]: 2025-05-15 09:20:49.034 [INFO][4212] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:20:49.037215 env[1156]: 2025-05-15 09:20:49.036 [INFO][4205] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" May 15 09:20:49.038479 env[1156]: time="2025-05-15T09:20:49.038372217Z" level=info msg="TearDown network for sandbox \"a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b\" successfully" May 15 09:20:49.038641 env[1156]: time="2025-05-15T09:20:49.038606658Z" level=info msg="StopPodSandbox for \"a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b\" returns successfully" May 15 09:20:49.039769 env[1156]: time="2025-05-15T09:20:49.039728666Z" level=info msg="RemovePodSandbox for \"a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b\"" May 15 09:20:49.039869 env[1156]: time="2025-05-15T09:20:49.039794931Z" level=info msg="Forcibly stopping sandbox \"a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b\"" May 15 09:20:49.170888 env[1156]: 2025-05-15 09:20:49.110 [WARNING][4231] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"58ca787e-dacc-4065-9fb9-bd5f94da9491", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 19, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1f13e4db17.novalocal", ContainerID:"f9ca1ad66f3f8039344a8c8ebf4e38b87997d29cbf807274017f6053abd27456", Pod:"coredns-6f6b679f8f-vjn6s", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.26.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali56bf1e1b197", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:20:49.170888 env[1156]: 2025-05-15 09:20:49.112 [INFO][4231] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" May 15 09:20:49.170888 env[1156]: 2025-05-15 09:20:49.113 [INFO][4231] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" iface="eth0" netns="" May 15 09:20:49.170888 env[1156]: 2025-05-15 09:20:49.113 [INFO][4231] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" May 15 09:20:49.170888 env[1156]: 2025-05-15 09:20:49.119 [INFO][4231] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" May 15 09:20:49.170888 env[1156]: 2025-05-15 09:20:49.159 [INFO][4238] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" HandleID="k8s-pod-network.a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-eth0" May 15 09:20:49.170888 env[1156]: 2025-05-15 09:20:49.159 [INFO][4238] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:20:49.170888 env[1156]: 2025-05-15 09:20:49.159 [INFO][4238] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:20:49.170888 env[1156]: 2025-05-15 09:20:49.166 [WARNING][4238] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" HandleID="k8s-pod-network.a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-eth0" May 15 09:20:49.170888 env[1156]: 2025-05-15 09:20:49.166 [INFO][4238] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" HandleID="k8s-pod-network.a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-coredns--6f6b679f8f--vjn6s-eth0" May 15 09:20:49.170888 env[1156]: 2025-05-15 09:20:49.168 [INFO][4238] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:20:49.170888 env[1156]: 2025-05-15 09:20:49.169 [INFO][4231] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b" May 15 09:20:49.172492 env[1156]: time="2025-05-15T09:20:49.170831342Z" level=info msg="TearDown network for sandbox \"a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b\" successfully" May 15 09:20:49.176579 env[1156]: time="2025-05-15T09:20:49.176515604Z" level=info msg="RemovePodSandbox \"a5dcd8f9412340a8ff09fcb310521a348b067487bfc3ca45eca7744df5ffaa4b\" returns successfully" May 15 09:20:49.177154 env[1156]: time="2025-05-15T09:20:49.177118106Z" level=info msg="StopPodSandbox for \"9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e\"" May 15 09:20:49.314026 env[1156]: 2025-05-15 09:20:49.263 [WARNING][4259] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-eth0", GenerateName:"calico-kube-controllers-6bdc9bc67-", Namespace:"calico-system", SelfLink:"", UID:"b5d0e6bf-a1a0-4752-8f38-d1bf2e0f377c", ResourceVersion:"767", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 20, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6bdc9bc67", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1f13e4db17.novalocal", ContainerID:"30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374", Pod:"calico-kube-controllers-6bdc9bc67-wm5x8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.26.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali16c4f5b4737", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:20:49.314026 env[1156]: 2025-05-15 09:20:49.264 [INFO][4259] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" May 15 09:20:49.314026 env[1156]: 2025-05-15 09:20:49.264 [INFO][4259] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" iface="eth0" netns="" May 15 09:20:49.314026 env[1156]: 2025-05-15 09:20:49.264 [INFO][4259] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" May 15 09:20:49.314026 env[1156]: 2025-05-15 09:20:49.264 [INFO][4259] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" May 15 09:20:49.314026 env[1156]: 2025-05-15 09:20:49.300 [INFO][4266] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" HandleID="k8s-pod-network.9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-eth0" May 15 09:20:49.314026 env[1156]: 2025-05-15 09:20:49.300 [INFO][4266] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:20:49.314026 env[1156]: 2025-05-15 09:20:49.300 [INFO][4266] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:20:49.314026 env[1156]: 2025-05-15 09:20:49.309 [WARNING][4266] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" HandleID="k8s-pod-network.9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-eth0" May 15 09:20:49.314026 env[1156]: 2025-05-15 09:20:49.309 [INFO][4266] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" HandleID="k8s-pod-network.9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-eth0" May 15 09:20:49.314026 env[1156]: 2025-05-15 09:20:49.311 [INFO][4266] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:20:49.314026 env[1156]: 2025-05-15 09:20:49.312 [INFO][4259] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" May 15 09:20:49.315226 env[1156]: time="2025-05-15T09:20:49.314079272Z" level=info msg="TearDown network for sandbox \"9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e\" successfully" May 15 09:20:49.315226 env[1156]: time="2025-05-15T09:20:49.314121261Z" level=info msg="StopPodSandbox for \"9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e\" returns successfully" May 15 09:20:49.316045 env[1156]: time="2025-05-15T09:20:49.316001825Z" level=info msg="RemovePodSandbox for \"9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e\"" May 15 09:20:49.316246 env[1156]: time="2025-05-15T09:20:49.316174189Z" level=info msg="Forcibly stopping sandbox \"9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e\"" May 15 09:20:49.433089 env[1156]: 2025-05-15 09:20:49.384 [WARNING][4287] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-eth0", GenerateName:"calico-kube-controllers-6bdc9bc67-", Namespace:"calico-system", SelfLink:"", UID:"b5d0e6bf-a1a0-4752-8f38-d1bf2e0f377c", ResourceVersion:"767", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 20, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6bdc9bc67", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1f13e4db17.novalocal", ContainerID:"30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374", Pod:"calico-kube-controllers-6bdc9bc67-wm5x8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.26.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali16c4f5b4737", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:20:49.433089 env[1156]: 2025-05-15 09:20:49.384 [INFO][4287] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" May 15 09:20:49.433089 env[1156]: 2025-05-15 09:20:49.384 [INFO][4287] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" iface="eth0" netns="" May 15 09:20:49.433089 env[1156]: 2025-05-15 09:20:49.384 [INFO][4287] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" May 15 09:20:49.433089 env[1156]: 2025-05-15 09:20:49.384 [INFO][4287] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" May 15 09:20:49.433089 env[1156]: 2025-05-15 09:20:49.420 [INFO][4294] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" HandleID="k8s-pod-network.9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-eth0" May 15 09:20:49.433089 env[1156]: 2025-05-15 09:20:49.420 [INFO][4294] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:20:49.433089 env[1156]: 2025-05-15 09:20:49.421 [INFO][4294] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:20:49.433089 env[1156]: 2025-05-15 09:20:49.429 [WARNING][4294] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" HandleID="k8s-pod-network.9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-eth0" May 15 09:20:49.433089 env[1156]: 2025-05-15 09:20:49.429 [INFO][4294] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" HandleID="k8s-pod-network.9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--kube--controllers--6bdc9bc67--wm5x8-eth0" May 15 09:20:49.433089 env[1156]: 2025-05-15 09:20:49.430 [INFO][4294] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:20:49.433089 env[1156]: 2025-05-15 09:20:49.431 [INFO][4287] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e" May 15 09:20:49.434776 env[1156]: time="2025-05-15T09:20:49.433059099Z" level=info msg="TearDown network for sandbox \"9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e\" successfully" May 15 09:20:49.438733 env[1156]: time="2025-05-15T09:20:49.438691923Z" level=info msg="RemovePodSandbox \"9980536fa36384a9adce40a06ac6345d7e6aecbf8f6d593fa119abf1b7a6b64e\" returns successfully" May 15 09:20:49.439320 env[1156]: time="2025-05-15T09:20:49.439282673Z" level=info msg="StopPodSandbox for \"5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1\"" May 15 09:20:49.577734 env[1156]: 2025-05-15 09:20:49.520 [WARNING][4315] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-eth0", GenerateName:"calico-apiserver-75fb8c8f64-", Namespace:"calico-apiserver", SelfLink:"", UID:"b6dcb7ec-8083-4d33-a2fd-c905bcb8ed81", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 20, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75fb8c8f64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1f13e4db17.novalocal", ContainerID:"3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d", Pod:"calico-apiserver-75fb8c8f64-dsrx7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.26.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibd4136e3802", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:20:49.577734 env[1156]: 2025-05-15 09:20:49.520 [INFO][4315] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" May 15 09:20:49.577734 env[1156]: 2025-05-15 09:20:49.520 [INFO][4315] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" iface="eth0" netns="" May 15 09:20:49.577734 env[1156]: 2025-05-15 09:20:49.520 [INFO][4315] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" May 15 09:20:49.577734 env[1156]: 2025-05-15 09:20:49.520 [INFO][4315] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" May 15 09:20:49.577734 env[1156]: 2025-05-15 09:20:49.564 [INFO][4322] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" HandleID="k8s-pod-network.5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-eth0" May 15 09:20:49.577734 env[1156]: 2025-05-15 09:20:49.564 [INFO][4322] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:20:49.577734 env[1156]: 2025-05-15 09:20:49.564 [INFO][4322] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:20:49.577734 env[1156]: 2025-05-15 09:20:49.572 [WARNING][4322] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" HandleID="k8s-pod-network.5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-eth0" May 15 09:20:49.577734 env[1156]: 2025-05-15 09:20:49.572 [INFO][4322] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" HandleID="k8s-pod-network.5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-eth0" May 15 09:20:49.577734 env[1156]: 2025-05-15 09:20:49.574 [INFO][4322] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:20:49.577734 env[1156]: 2025-05-15 09:20:49.576 [INFO][4315] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" May 15 09:20:49.578500 env[1156]: time="2025-05-15T09:20:49.577776058Z" level=info msg="TearDown network for sandbox \"5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1\" successfully" May 15 09:20:49.578500 env[1156]: time="2025-05-15T09:20:49.577822596Z" level=info msg="StopPodSandbox for \"5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1\" returns successfully" May 15 09:20:49.579086 env[1156]: time="2025-05-15T09:20:49.579060592Z" level=info msg="RemovePodSandbox for \"5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1\"" May 15 09:20:49.579157 env[1156]: time="2025-05-15T09:20:49.579092882Z" level=info msg="Forcibly stopping sandbox \"5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1\"" May 15 09:20:49.705880 env[1156]: 2025-05-15 09:20:49.650 [WARNING][4341] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-eth0", GenerateName:"calico-apiserver-75fb8c8f64-", Namespace:"calico-apiserver", SelfLink:"", UID:"b6dcb7ec-8083-4d33-a2fd-c905bcb8ed81", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 20, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75fb8c8f64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1f13e4db17.novalocal", ContainerID:"3f9343fb6ee75dea9fb67a43edd533bafe61ae78c0e2f4db6f1cf6f26e47576d", Pod:"calico-apiserver-75fb8c8f64-dsrx7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.26.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibd4136e3802", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:20:49.705880 env[1156]: 2025-05-15 09:20:49.650 [INFO][4341] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" May 15 09:20:49.705880 env[1156]: 2025-05-15 09:20:49.650 [INFO][4341] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" iface="eth0" netns="" May 15 09:20:49.705880 env[1156]: 2025-05-15 09:20:49.650 [INFO][4341] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" May 15 09:20:49.705880 env[1156]: 2025-05-15 09:20:49.650 [INFO][4341] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" May 15 09:20:49.705880 env[1156]: 2025-05-15 09:20:49.685 [INFO][4348] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" HandleID="k8s-pod-network.5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-eth0" May 15 09:20:49.705880 env[1156]: 2025-05-15 09:20:49.685 [INFO][4348] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:20:49.705880 env[1156]: 2025-05-15 09:20:49.685 [INFO][4348] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:20:49.705880 env[1156]: 2025-05-15 09:20:49.693 [WARNING][4348] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" HandleID="k8s-pod-network.5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-eth0" May 15 09:20:49.705880 env[1156]: 2025-05-15 09:20:49.693 [INFO][4348] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" HandleID="k8s-pod-network.5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-calico--apiserver--75fb8c8f64--dsrx7-eth0" May 15 09:20:49.705880 env[1156]: 2025-05-15 09:20:49.694 [INFO][4348] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:20:49.705880 env[1156]: 2025-05-15 09:20:49.701 [INFO][4341] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1" May 15 09:20:49.707643 env[1156]: time="2025-05-15T09:20:49.707606384Z" level=info msg="TearDown network for sandbox \"5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1\" successfully" May 15 09:20:49.714143 env[1156]: time="2025-05-15T09:20:49.714108011Z" level=info msg="RemovePodSandbox \"5e1656394160448c5362b9dec5981b50c4414a02fe742129cb05cbfc91e9b3b1\" returns successfully" May 15 09:20:49.715103 env[1156]: time="2025-05-15T09:20:49.715058798Z" level=info msg="StopPodSandbox for \"5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17\"" May 15 09:20:49.844617 env[1156]: 2025-05-15 09:20:49.792 [WARNING][4369] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ca20f477-1f70-4715-974d-aef8a8817c3d", ResourceVersion:"760", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 20, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1f13e4db17.novalocal", ContainerID:"5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c", Pod:"csi-node-driver-gnt2w", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.26.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9eb395fbbc2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:20:49.844617 env[1156]: 2025-05-15 09:20:49.793 [INFO][4369] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" May 15 09:20:49.844617 env[1156]: 2025-05-15 09:20:49.793 [INFO][4369] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" iface="eth0" netns="" May 15 09:20:49.844617 env[1156]: 2025-05-15 09:20:49.793 [INFO][4369] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" May 15 09:20:49.844617 env[1156]: 2025-05-15 09:20:49.793 [INFO][4369] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" May 15 09:20:49.844617 env[1156]: 2025-05-15 09:20:49.827 [INFO][4376] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" HandleID="k8s-pod-network.5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-eth0" May 15 09:20:49.844617 env[1156]: 2025-05-15 09:20:49.827 [INFO][4376] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:20:49.844617 env[1156]: 2025-05-15 09:20:49.827 [INFO][4376] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:20:49.844617 env[1156]: 2025-05-15 09:20:49.836 [WARNING][4376] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" HandleID="k8s-pod-network.5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-eth0" May 15 09:20:49.844617 env[1156]: 2025-05-15 09:20:49.836 [INFO][4376] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" HandleID="k8s-pod-network.5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-eth0" May 15 09:20:49.844617 env[1156]: 2025-05-15 09:20:49.838 [INFO][4376] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:20:49.844617 env[1156]: 2025-05-15 09:20:49.839 [INFO][4369] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" May 15 09:20:49.845342 env[1156]: time="2025-05-15T09:20:49.845309614Z" level=info msg="TearDown network for sandbox \"5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17\" successfully" May 15 09:20:49.845431 env[1156]: time="2025-05-15T09:20:49.845410233Z" level=info msg="StopPodSandbox for \"5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17\" returns successfully" May 15 09:20:49.848495 env[1156]: time="2025-05-15T09:20:49.848466366Z" level=info msg="RemovePodSandbox for \"5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17\"" May 15 09:20:49.848689 env[1156]: time="2025-05-15T09:20:49.848646684Z" level=info msg="Forcibly stopping sandbox \"5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17\"" May 15 09:20:49.956423 env[1156]: 2025-05-15 09:20:49.912 [WARNING][4399] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ca20f477-1f70-4715-974d-aef8a8817c3d", ResourceVersion:"760", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 9, 20, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-1f13e4db17.novalocal", ContainerID:"5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c", Pod:"csi-node-driver-gnt2w", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.26.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9eb395fbbc2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 09:20:49.956423 env[1156]: 2025-05-15 09:20:49.912 [INFO][4399] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" May 15 09:20:49.956423 env[1156]: 2025-05-15 09:20:49.912 [INFO][4399] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" iface="eth0" netns="" May 15 09:20:49.956423 env[1156]: 2025-05-15 09:20:49.912 [INFO][4399] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" May 15 09:20:49.956423 env[1156]: 2025-05-15 09:20:49.912 [INFO][4399] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" May 15 09:20:49.956423 env[1156]: 2025-05-15 09:20:49.943 [INFO][4406] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" HandleID="k8s-pod-network.5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-eth0" May 15 09:20:49.956423 env[1156]: 2025-05-15 09:20:49.943 [INFO][4406] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 09:20:49.956423 env[1156]: 2025-05-15 09:20:49.943 [INFO][4406] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 09:20:49.956423 env[1156]: 2025-05-15 09:20:49.951 [WARNING][4406] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" HandleID="k8s-pod-network.5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-eth0" May 15 09:20:49.956423 env[1156]: 2025-05-15 09:20:49.951 [INFO][4406] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" HandleID="k8s-pod-network.5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" Workload="ci--3510--3--7--n--1f13e4db17.novalocal-k8s-csi--node--driver--gnt2w-eth0" May 15 09:20:49.956423 env[1156]: 2025-05-15 09:20:49.954 [INFO][4406] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 09:20:49.956423 env[1156]: 2025-05-15 09:20:49.955 [INFO][4399] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17" May 15 09:20:49.958041 env[1156]: time="2025-05-15T09:20:49.957991095Z" level=info msg="TearDown network for sandbox \"5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17\" successfully" May 15 09:20:49.962674 env[1156]: time="2025-05-15T09:20:49.962644429Z" level=info msg="RemovePodSandbox \"5ea396e787be621254f40f58bb90ad8bb596242405c1f5fa5a82a88def4ebf17\" returns successfully" May 15 09:20:50.479943 env[1156]: time="2025-05-15T09:20:50.479864346Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:50.483475 env[1156]: time="2025-05-15T09:20:50.483437109Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:50.486277 env[1156]: time="2025-05-15T09:20:50.486241639Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:50.489574 env[1156]: time="2025-05-15T09:20:50.489221759Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:50.490356 env[1156]: time="2025-05-15T09:20:50.490284015Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 15 09:20:50.498752 env[1156]: time="2025-05-15T09:20:50.498277265Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 09:20:50.531408 env[1156]: time="2025-05-15T09:20:50.530692314Z" level=info msg="CreateContainer within sandbox \"30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 15 09:20:50.555118 env[1156]: time="2025-05-15T09:20:50.555055755Z" level=info msg="CreateContainer within sandbox \"30575f434952498013ad8b89e45b7c8669bf6b66dffdf971415aa7054d4da374\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"a971b5e40d66e250b96d4cd763b06b9a123d362b996aebd9957752bb747b6281\"" May 15 09:20:50.555962 env[1156]: time="2025-05-15T09:20:50.555806706Z" level=info msg="StartContainer for \"a971b5e40d66e250b96d4cd763b06b9a123d362b996aebd9957752bb747b6281\"" May 15 09:20:50.599121 systemd[1]: Started cri-containerd-a971b5e40d66e250b96d4cd763b06b9a123d362b996aebd9957752bb747b6281.scope. May 15 09:20:50.627456 kernel: kauditd_printk_skb: 209 callbacks suppressed May 15 09:20:50.627729 kernel: audit: type=1400 audit(1747300850.618:1311): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.633559 kernel: audit: type=1400 audit(1747300850.618:1312): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.639548 kernel: audit: type=1400 audit(1747300850.618:1313): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.651041 kernel: audit: type=1400 audit(1747300850.618:1314): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.651263 kernel: audit: type=1400 audit(1747300850.618:1315): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.651297 kernel: audit: type=1400 audit(1747300850.618:1316): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.668025 kernel: audit: type=1400 audit(1747300850.618:1317): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.668100 kernel: audit: type=1400 audit(1747300850.618:1318): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.672977 kernel: audit: type=1400 audit(1747300850.618:1319): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.673047 kernel: audit: type=1400 audit(1747300850.626:1320): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.626000 audit: BPF prog-id=194 op=LOAD May 15 09:20:50.627000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.627000 audit[4422]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3349 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:50.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139373162356534306436366532353062393664346364373633623036 May 15 09:20:50.627000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.627000 audit[4422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3349 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:50.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139373162356534306436366532353062393664346364373633623036 May 15 09:20:50.627000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.627000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.627000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.627000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.627000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.627000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.627000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.627000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.627000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.627000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.627000 audit: BPF prog-id=195 op=LOAD May 15 09:20:50.627000 audit[4422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00031fe10 items=0 ppid=3349 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:50.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139373162356534306436366532353062393664346364373633623036 May 15 09:20:50.632000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.632000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.632000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.632000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.632000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.632000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.632000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.632000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.632000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.632000 audit: BPF prog-id=196 op=LOAD May 15 09:20:50.632000 audit[4422]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00031fe58 items=0 ppid=3349 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:50.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139373162356534306436366532353062393664346364373633623036 May 15 09:20:50.637000 audit: BPF prog-id=196 op=UNLOAD May 15 09:20:50.637000 audit: BPF prog-id=195 op=UNLOAD May 15 09:20:50.637000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.637000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.637000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.637000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.637000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.637000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.637000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.637000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.637000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.637000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:50.637000 audit: BPF prog-id=197 op=LOAD May 15 09:20:50.637000 audit[4422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00037e268 items=0 ppid=3349 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:50.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139373162356534306436366532353062393664346364373633623036 May 15 09:20:50.836971 env[1156]: time="2025-05-15T09:20:50.836783967Z" level=info msg="StartContainer for \"a971b5e40d66e250b96d4cd763b06b9a123d362b996aebd9957752bb747b6281\" returns successfully" May 15 09:20:51.074890 env[1156]: time="2025-05-15T09:20:51.074785511Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:51.077493 env[1156]: time="2025-05-15T09:20:51.077428427Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:51.080963 env[1156]: time="2025-05-15T09:20:51.080930136Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:51.084501 env[1156]: time="2025-05-15T09:20:51.084475658Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:51.085993 env[1156]: time="2025-05-15T09:20:51.085928098Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 15 09:20:51.090485 env[1156]: time="2025-05-15T09:20:51.090114093Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 15 09:20:51.091506 env[1156]: time="2025-05-15T09:20:51.091475481Z" level=info msg="CreateContainer within sandbox \"d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 09:20:51.119132 env[1156]: time="2025-05-15T09:20:51.119039083Z" level=info msg="CreateContainer within sandbox \"d99196de8db529a6bb255e151ded36ae14c281824d39c18261be99ecbd968e2b\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"931a2b7c7375c9a5875d9690774279abc08a172c054ff17e5fde417d879e20c2\"" May 15 09:20:51.120841 env[1156]: time="2025-05-15T09:20:51.120810913Z" level=info msg="StartContainer for \"931a2b7c7375c9a5875d9690774279abc08a172c054ff17e5fde417d879e20c2\"" May 15 09:20:51.153085 systemd[1]: Started cri-containerd-931a2b7c7375c9a5875d9690774279abc08a172c054ff17e5fde417d879e20c2.scope. May 15 09:20:51.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.175000 audit: BPF prog-id=198 op=LOAD May 15 09:20:51.176000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.176000 audit[4457]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3720 pid=4457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:51.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933316132623763373337356339613538373564393639303737343237 May 15 09:20:51.177000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.177000 audit[4457]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3720 pid=4457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:51.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933316132623763373337356339613538373564393639303737343237 May 15 09:20:51.177000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.177000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.177000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.177000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.177000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.177000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.177000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.177000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.177000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.177000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.177000 audit: BPF prog-id=199 op=LOAD May 15 09:20:51.177000 audit[4457]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000390690 items=0 ppid=3720 pid=4457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:51.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933316132623763373337356339613538373564393639303737343237 May 15 09:20:51.178000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.178000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.178000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.178000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.178000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.178000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.178000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.178000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.178000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.178000 audit: BPF prog-id=200 op=LOAD May 15 09:20:51.178000 audit[4457]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003906d8 items=0 ppid=3720 pid=4457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:51.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933316132623763373337356339613538373564393639303737343237 May 15 09:20:51.178000 audit: BPF prog-id=200 op=UNLOAD May 15 09:20:51.179000 audit: BPF prog-id=199 op=UNLOAD May 15 09:20:51.179000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.179000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.179000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.179000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.179000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.179000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.179000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.179000 audit[4457]: AVC avc: denied { perfmon } for pid=4457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.179000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.179000 audit[4457]: AVC avc: denied { bpf } for pid=4457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:51.179000 audit: BPF prog-id=201 op=LOAD May 15 09:20:51.179000 audit[4457]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000390ae8 items=0 ppid=3720 pid=4457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:51.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933316132623763373337356339613538373564393639303737343237 May 15 09:20:51.294006 env[1156]: time="2025-05-15T09:20:51.293959558Z" level=info msg="StartContainer for \"931a2b7c7375c9a5875d9690774279abc08a172c054ff17e5fde417d879e20c2\" returns successfully" May 15 09:20:51.520829 systemd[1]: run-containerd-runc-k8s.io-a971b5e40d66e250b96d4cd763b06b9a123d362b996aebd9957752bb747b6281-runc.g1hMb0.mount: Deactivated successfully. May 15 09:20:51.933901 kubelet[1952]: I0515 09:20:51.933675 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6bdc9bc67-wm5x8" podStartSLOduration=33.895401188 podStartE2EDuration="48.93360549s" podCreationTimestamp="2025-05-15 09:20:03 +0000 UTC" firstStartedPulling="2025-05-15 09:20:35.459184303 +0000 UTC m=+47.429778274" lastFinishedPulling="2025-05-15 09:20:50.497388605 +0000 UTC m=+62.467982576" observedRunningTime="2025-05-15 09:20:50.917563737 +0000 UTC m=+62.888157708" watchObservedRunningTime="2025-05-15 09:20:51.93360549 +0000 UTC m=+63.904199511" May 15 09:20:51.934632 kubelet[1952]: I0515 09:20:51.934493 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-75fb8c8f64-z6k6g" podStartSLOduration=36.881242214 podStartE2EDuration="49.934476076s" podCreationTimestamp="2025-05-15 09:20:02 +0000 UTC" firstStartedPulling="2025-05-15 09:20:38.034769534 +0000 UTC m=+50.005363516" lastFinishedPulling="2025-05-15 09:20:51.088003357 +0000 UTC m=+63.058597378" observedRunningTime="2025-05-15 09:20:51.929963216 +0000 UTC m=+63.900557257" watchObservedRunningTime="2025-05-15 09:20:51.934476076 +0000 UTC m=+63.905070097" May 15 09:20:51.936951 systemd[1]: run-containerd-runc-k8s.io-a971b5e40d66e250b96d4cd763b06b9a123d362b996aebd9957752bb747b6281-runc.XMutRu.mount: Deactivated successfully. May 15 09:20:51.964000 audit[4503]: NETFILTER_CFG table=filter:112 family=2 entries=10 op=nft_register_rule pid=4503 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:20:51.964000 audit[4503]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff34b50630 a2=0 a3=7fff34b5061c items=0 ppid=2126 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:51.964000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:20:51.971000 audit[4503]: NETFILTER_CFG table=nat:113 family=2 entries=20 op=nft_register_rule pid=4503 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:20:51.971000 audit[4503]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff34b50630 a2=0 a3=7fff34b5061c items=0 ppid=2126 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:51.971000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:20:52.878080 kubelet[1952]: I0515 09:20:52.878015 1952 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 09:20:53.391000 audit[4468]: AVC avc: denied { watch } for pid=4468 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_09_20_20.1273244570/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c673 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c214,c673 tclass=file permissive=0 May 15 09:20:53.391000 audit[4468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a2ba40 a2=fc6 a3=0 items=0 ppid=3720 pid=4468 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c673 key=(null) May 15 09:20:53.391000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 09:20:54.023725 env[1156]: time="2025-05-15T09:20:54.023635448Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:54.026470 env[1156]: time="2025-05-15T09:20:54.026412547Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:54.030870 env[1156]: time="2025-05-15T09:20:54.030818013Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:54.034952 env[1156]: time="2025-05-15T09:20:54.034894032Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 09:20:54.037007 env[1156]: time="2025-05-15T09:20:54.036932692Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 15 09:20:54.045639 env[1156]: time="2025-05-15T09:20:54.045580901Z" level=info msg="CreateContainer within sandbox \"5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 15 09:20:54.062327 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount584698515.mount: Deactivated successfully. May 15 09:20:54.075766 env[1156]: time="2025-05-15T09:20:54.075692235Z" level=info msg="CreateContainer within sandbox \"5e0ffbffe86cead0d785fa1b24026f869279056c7c1463f2b762ed0e8ab9a65c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"2c5fd9f81c662f625ba14a73381839a2fbb1e2e3ece7c80f796b0525b8ee2924\"" May 15 09:20:54.078767 env[1156]: time="2025-05-15T09:20:54.078695778Z" level=info msg="StartContainer for \"2c5fd9f81c662f625ba14a73381839a2fbb1e2e3ece7c80f796b0525b8ee2924\"" May 15 09:20:54.146325 systemd[1]: run-containerd-runc-k8s.io-2c5fd9f81c662f625ba14a73381839a2fbb1e2e3ece7c80f796b0525b8ee2924-runc.YSUJpx.mount: Deactivated successfully. May 15 09:20:54.155305 systemd[1]: Started cri-containerd-2c5fd9f81c662f625ba14a73381839a2fbb1e2e3ece7c80f796b0525b8ee2924.scope. May 15 09:20:54.180000 audit[4514]: AVC avc: denied { perfmon } for pid=4514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.180000 audit[4514]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7f1e102a94d8 items=0 ppid=3251 pid=4514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:54.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263356664396638316336363266363235626131346137333338313833 May 15 09:20:54.180000 audit[4514]: AVC avc: denied { bpf } for pid=4514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.180000 audit[4514]: AVC avc: denied { bpf } for pid=4514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.180000 audit[4514]: AVC avc: denied { bpf } for pid=4514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.180000 audit[4514]: AVC avc: denied { perfmon } for pid=4514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.180000 audit[4514]: AVC avc: denied { perfmon } for pid=4514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.180000 audit[4514]: AVC avc: denied { perfmon } for pid=4514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.180000 audit[4514]: AVC avc: denied { perfmon } for pid=4514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.180000 audit[4514]: AVC avc: denied { perfmon } for pid=4514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.180000 audit[4514]: AVC avc: denied { bpf } for pid=4514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.180000 audit[4514]: AVC avc: denied { bpf } for pid=4514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.180000 audit: BPF prog-id=202 op=LOAD May 15 09:20:54.180000 audit[4514]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c000298c18 items=0 ppid=3251 pid=4514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:54.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263356664396638316336363266363235626131346137333338313833 May 15 09:20:54.181000 audit[4514]: AVC avc: denied { bpf } for pid=4514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.181000 audit[4514]: AVC avc: denied { bpf } for pid=4514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.181000 audit[4514]: AVC avc: denied { perfmon } for pid=4514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.181000 audit[4514]: AVC avc: denied { perfmon } for pid=4514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.181000 audit[4514]: AVC avc: denied { perfmon } for pid=4514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.181000 audit[4514]: AVC avc: denied { perfmon } for pid=4514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.181000 audit[4514]: AVC avc: denied { perfmon } for pid=4514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.181000 audit[4514]: AVC avc: denied { bpf } for pid=4514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.181000 audit[4514]: AVC avc: denied { bpf } for pid=4514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.181000 audit: BPF prog-id=203 op=LOAD May 15 09:20:54.181000 audit[4514]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c000298c68 items=0 ppid=3251 pid=4514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:54.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263356664396638316336363266363235626131346137333338313833 May 15 09:20:54.181000 audit: BPF prog-id=203 op=UNLOAD May 15 09:20:54.181000 audit: BPF prog-id=202 op=UNLOAD May 15 09:20:54.181000 audit[4514]: AVC avc: denied { bpf } for pid=4514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.181000 audit[4514]: AVC avc: denied { bpf } for pid=4514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.181000 audit[4514]: AVC avc: denied { bpf } for pid=4514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.181000 audit[4514]: AVC avc: denied { perfmon } for pid=4514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.181000 audit[4514]: AVC avc: denied { perfmon } for pid=4514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.181000 audit[4514]: AVC avc: denied { perfmon } for pid=4514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.181000 audit[4514]: AVC avc: denied { perfmon } for pid=4514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.181000 audit[4514]: AVC avc: denied { perfmon } for pid=4514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.181000 audit[4514]: AVC avc: denied { bpf } for pid=4514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.181000 audit[4514]: AVC avc: denied { bpf } for pid=4514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 09:20:54.181000 audit: BPF prog-id=204 op=LOAD May 15 09:20:54.181000 audit[4514]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c000298cf8 items=0 ppid=3251 pid=4514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:20:54.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263356664396638316336363266363235626131346137333338313833 May 15 09:20:54.211464 env[1156]: time="2025-05-15T09:20:54.211367947Z" level=info msg="StartContainer for \"2c5fd9f81c662f625ba14a73381839a2fbb1e2e3ece7c80f796b0525b8ee2924\" returns successfully" May 15 09:20:54.377068 kubelet[1952]: I0515 09:20:54.376915 1952 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 15 09:20:54.378041 kubelet[1952]: I0515 09:20:54.377173 1952 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 15 09:20:55.080142 kubelet[1952]: I0515 09:20:55.079806 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-gnt2w" podStartSLOduration=34.275583957 podStartE2EDuration="53.079683013s" podCreationTimestamp="2025-05-15 09:20:02 +0000 UTC" firstStartedPulling="2025-05-15 09:20:35.235258943 +0000 UTC m=+47.205852914" lastFinishedPulling="2025-05-15 09:20:54.039357959 +0000 UTC m=+66.009951970" observedRunningTime="2025-05-15 09:20:55.078139733 +0000 UTC m=+67.048733765" watchObservedRunningTime="2025-05-15 09:20:55.079683013 +0000 UTC m=+67.050277034" May 15 09:21:19.271825 kubelet[1952]: I0515 09:21:19.271307 1952 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 09:21:19.447000 audit[4589]: NETFILTER_CFG table=filter:114 family=2 entries=9 op=nft_register_rule pid=4589 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:21:19.452825 kernel: kauditd_printk_skb: 156 callbacks suppressed May 15 09:21:19.453082 kernel: audit: type=1325 audit(1747300879.447:1356): table=filter:114 family=2 entries=9 op=nft_register_rule pid=4589 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:21:19.447000 audit[4589]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdae72f3d0 a2=0 a3=7ffdae72f3bc items=0 ppid=2126 pid=4589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:21:19.464359 kernel: audit: type=1300 audit(1747300879.447:1356): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdae72f3d0 a2=0 a3=7ffdae72f3bc items=0 ppid=2126 pid=4589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:21:19.464538 kernel: audit: type=1327 audit(1747300879.447:1356): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:21:19.447000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:21:19.466000 audit[4589]: NETFILTER_CFG table=nat:115 family=2 entries=27 op=nft_register_chain pid=4589 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:21:19.471939 kernel: audit: type=1325 audit(1747300879.466:1357): table=nat:115 family=2 entries=27 op=nft_register_chain pid=4589 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:21:19.472039 kernel: audit: type=1300 audit(1747300879.466:1357): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffdae72f3d0 a2=0 a3=7ffdae72f3bc items=0 ppid=2126 pid=4589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:21:19.466000 audit[4589]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffdae72f3d0 a2=0 a3=7ffdae72f3bc items=0 ppid=2126 pid=4589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:21:19.466000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:21:19.483421 kernel: audit: type=1327 audit(1747300879.466:1357): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:21:20.364101 kubelet[1952]: I0515 09:21:20.364012 1952 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 09:21:20.492000 audit[4591]: NETFILTER_CFG table=filter:116 family=2 entries=8 op=nft_register_rule pid=4591 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:21:20.492000 audit[4591]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffde4206ed0 a2=0 a3=7ffde4206ebc items=0 ppid=2126 pid=4591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:21:20.505627 kernel: audit: type=1325 audit(1747300880.492:1358): table=filter:116 family=2 entries=8 op=nft_register_rule pid=4591 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:21:20.505790 kernel: audit: type=1300 audit(1747300880.492:1358): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffde4206ed0 a2=0 a3=7ffde4206ebc items=0 ppid=2126 pid=4591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:21:20.505852 kernel: audit: type=1327 audit(1747300880.492:1358): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:21:20.492000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:21:20.510000 audit[4591]: NETFILTER_CFG table=nat:117 family=2 entries=34 op=nft_register_chain pid=4591 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:21:20.510000 audit[4591]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffde4206ed0 a2=0 a3=7ffde4206ebc items=0 ppid=2126 pid=4591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:21:20.510000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:21:20.516584 kernel: audit: type=1325 audit(1747300880.510:1359): table=nat:117 family=2 entries=34 op=nft_register_chain pid=4591 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:21:43.797000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:21:43.805347 kernel: kauditd_printk_skb: 2 callbacks suppressed May 15 09:21:43.806046 kernel: audit: type=1400 audit(1747300903.797:1360): avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:21:43.797000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00130eb10 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:21:43.847640 kernel: audit: type=1300 audit(1747300903.797:1360): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00130eb10 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:21:43.847875 kernel: audit: type=1327 audit(1747300903.797:1360): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:21:43.797000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:21:43.867924 kernel: audit: type=1400 audit(1747300903.807:1361): avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:21:43.807000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:21:43.807000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b25200 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:21:43.888754 kernel: audit: type=1300 audit(1747300903.807:1361): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b25200 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:21:43.888946 kernel: audit: type=1327 audit(1747300903.807:1361): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:21:43.807000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:21:44.546000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:21:44.568646 kernel: audit: type=1400 audit(1747300904.546:1362): avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:21:44.546000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00ccbe180 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:21:44.590697 kernel: audit: type=1300 audit(1747300904.546:1362): arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00ccbe180 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:21:44.590921 kernel: audit: type=1327 audit(1747300904.546:1362): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:21:44.546000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:21:44.567000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:21:44.567000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00c250480 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:21:44.567000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:21:44.625801 kernel: audit: type=1400 audit(1747300904.567:1363): avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:21:44.567000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:21:44.567000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00ccbe240 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:21:44.567000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:21:44.567000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:21:44.567000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00c8c0900 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:21:44.567000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:21:44.567000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:21:44.567000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00c8c0930 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:21:44.567000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:21:44.569000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:21:44.569000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00c250660 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:21:44.569000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:21:47.116000 audit[4052]: AVC avc: denied { watch } for pid=4052 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_09_20_20.3686309504/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c808,c879 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c808,c879 tclass=file permissive=0 May 15 09:21:47.116000 audit[4052]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001e2fba0 a2=fc6 a3=0 items=0 ppid=3296 pid=4052 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c808,c879 key=(null) May 15 09:21:47.116000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 09:21:48.508000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:21:48.508000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b25520 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:21:48.508000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:21:48.508000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:21:48.508000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ed6880 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:21:48.508000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:21:48.510000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:21:48.510000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:21:48.510000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b25940 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:21:48.510000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:21:48.510000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ed6fa0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:21:48.510000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:21:53.393000 audit[4468]: AVC avc: denied { watch } for pid=4468 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_09_20_20.1273244570/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c673 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c214,c673 tclass=file permissive=0 May 15 09:21:53.395896 kernel: kauditd_printk_skb: 29 callbacks suppressed May 15 09:21:53.396115 kernel: audit: type=1400 audit(1747300913.393:1373): avc: denied { watch } for pid=4468 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_09_20_20.1273244570/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c673 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c214,c673 tclass=file permissive=0 May 15 09:21:53.393000 audit[4468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0012a6820 a2=fc6 a3=0 items=0 ppid=3720 pid=4468 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c673 key=(null) May 15 09:21:53.393000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 09:21:53.423008 kernel: audit: type=1300 audit(1747300913.393:1373): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0012a6820 a2=fc6 a3=0 items=0 ppid=3720 pid=4468 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c673 key=(null) May 15 09:21:53.423139 kernel: audit: type=1327 audit(1747300913.393:1373): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 09:22:04.860438 systemd[1]: run-containerd-runc-k8s.io-1baed0fd5b8d0f5e87561ba7eefc4e63950f1175bfd80637fdcbe4853b78964c-runc.WjRmz8.mount: Deactivated successfully. May 15 09:22:43.807000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:22:43.827653 kernel: audit: type=1400 audit(1747300963.807:1374): avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:22:43.807000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0022523c0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:22:43.807000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:22:43.863899 kernel: audit: type=1300 audit(1747300963.807:1374): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0022523c0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:22:43.864299 kernel: audit: type=1327 audit(1747300963.807:1374): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:22:43.864454 kernel: audit: type=1400 audit(1747300963.809:1375): avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:22:43.809000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:22:43.809000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0028c2280 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:22:43.894460 kernel: audit: type=1300 audit(1747300963.809:1375): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0028c2280 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:22:43.894694 kernel: audit: type=1327 audit(1747300963.809:1375): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:22:43.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:22:44.549000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:22:44.565584 kernel: audit: type=1400 audit(1747300964.549:1376): avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:22:44.549000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0062bdc50 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:22:44.593626 kernel: audit: type=1300 audit(1747300964.549:1376): arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0062bdc50 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:22:44.549000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:22:44.591000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:22:44.624839 kernel: audit: type=1327 audit(1747300964.549:1376): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:22:44.625143 kernel: audit: type=1400 audit(1747300964.591:1377): avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:22:44.591000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0034f3960 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:22:44.591000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:22:44.592000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:22:44.592000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00648d140 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:22:44.592000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:22:44.592000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:22:44.592000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00648d260 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:22:44.592000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:22:44.592000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:22:44.592000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00648d320 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:22:44.592000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:22:44.592000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:22:44.592000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0034f3980 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:22:44.592000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:22:47.121000 audit[4052]: AVC avc: denied { watch } for pid=4052 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_09_20_20.3686309504/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c808,c879 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c808,c879 tclass=file permissive=0 May 15 09:22:47.121000 audit[4052]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000a136e0 a2=fc6 a3=0 items=0 ppid=3296 pid=4052 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c808,c879 key=(null) May 15 09:22:47.121000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 09:22:48.511000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:22:48.511000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00281c380 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:22:48.511000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:22:48.511000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:22:48.511000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00281c3a0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:22:48.511000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:22:48.512000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:22:48.512000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00281c3c0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:22:48.512000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:22:48.513000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:22:48.513000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00281c3e0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:22:48.513000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:22:53.397000 audit[4468]: AVC avc: denied { watch } for pid=4468 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_09_20_20.1273244570/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c673 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c214,c673 tclass=file permissive=0 May 15 09:22:53.402222 kernel: kauditd_printk_skb: 29 callbacks suppressed May 15 09:22:53.402478 kernel: audit: type=1400 audit(1747300973.397:1387): avc: denied { watch } for pid=4468 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_09_20_20.1273244570/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c673 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c214,c673 tclass=file permissive=0 May 15 09:22:53.397000 audit[4468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0013bc880 a2=fc6 a3=0 items=0 ppid=3720 pid=4468 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c673 key=(null) May 15 09:22:53.397000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 09:22:53.453506 kernel: audit: type=1300 audit(1747300973.397:1387): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0013bc880 a2=fc6 a3=0 items=0 ppid=3720 pid=4468 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c673 key=(null) May 15 09:22:53.453865 kernel: audit: type=1327 audit(1747300973.397:1387): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 09:23:04.833638 systemd[1]: run-containerd-runc-k8s.io-1baed0fd5b8d0f5e87561ba7eefc4e63950f1175bfd80637fdcbe4853b78964c-runc.QimMUz.mount: Deactivated successfully. May 15 09:23:30.499381 systemd[1]: Started sshd@9-172.24.4.133:22-172.24.4.1:35872.service. May 15 09:23:30.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.133:22-172.24.4.1:35872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:30.508570 kernel: audit: type=1130 audit(1747301010.501:1388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.133:22-172.24.4.1:35872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:31.698000 audit[4875]: USER_ACCT pid=4875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:31.700930 sshd[4875]: Accepted publickey for core from 172.24.4.1 port 35872 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:23:31.717616 kernel: audit: type=1101 audit(1747301011.698:1389): pid=4875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:31.718000 audit[4875]: CRED_ACQ pid=4875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:31.739603 kernel: audit: type=1103 audit(1747301011.718:1390): pid=4875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:31.740130 sshd[4875]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:23:31.718000 audit[4875]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff67405330 a2=3 a3=0 items=0 ppid=1 pid=4875 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:31.760184 kernel: audit: type=1006 audit(1747301011.718:1391): pid=4875 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 15 09:23:31.760366 kernel: audit: type=1300 audit(1747301011.718:1391): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff67405330 a2=3 a3=0 items=0 ppid=1 pid=4875 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:31.718000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 09:23:31.764562 kernel: audit: type=1327 audit(1747301011.718:1391): proctitle=737368643A20636F7265205B707269765D May 15 09:23:31.772362 systemd-logind[1148]: New session 10 of user core. May 15 09:23:31.773453 systemd[1]: Started session-10.scope. May 15 09:23:31.782000 audit[4875]: USER_START pid=4875 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:31.791594 kernel: audit: type=1105 audit(1747301011.782:1392): pid=4875 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:31.792000 audit[4877]: CRED_ACQ pid=4877 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:31.799645 kernel: audit: type=1103 audit(1747301011.792:1393): pid=4877 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:32.446928 sshd[4875]: pam_unix(sshd:session): session closed for user core May 15 09:23:32.449000 audit[4875]: USER_END pid=4875 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:32.453882 systemd[1]: sshd@9-172.24.4.133:22-172.24.4.1:35872.service: Deactivated successfully. May 15 09:23:32.463898 systemd-logind[1148]: Session 10 logged out. Waiting for processes to exit. May 15 09:23:32.472949 kernel: audit: type=1106 audit(1747301012.449:1394): pid=4875 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:32.473215 kernel: audit: type=1104 audit(1747301012.450:1395): pid=4875 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:32.450000 audit[4875]: CRED_DISP pid=4875 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:32.469924 systemd[1]: session-10.scope: Deactivated successfully. May 15 09:23:32.476298 systemd-logind[1148]: Removed session 10. May 15 09:23:32.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.133:22-172.24.4.1:35872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:37.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.133:22-172.24.4.1:41880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:37.458117 systemd[1]: Started sshd@10-172.24.4.133:22-172.24.4.1:41880.service. May 15 09:23:37.462250 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 09:23:37.462448 kernel: audit: type=1130 audit(1747301017.458:1397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.133:22-172.24.4.1:41880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:38.670000 audit[4910]: USER_ACCT pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:38.673470 sshd[4910]: Accepted publickey for core from 172.24.4.1 port 41880 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:23:38.686623 kernel: audit: type=1101 audit(1747301018.670:1398): pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:38.701743 kernel: audit: type=1103 audit(1747301018.685:1399): pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:38.685000 audit[4910]: CRED_ACQ pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:38.687456 sshd[4910]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:23:38.712583 kernel: audit: type=1006 audit(1747301018.686:1400): pid=4910 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 15 09:23:38.686000 audit[4910]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3acd3cf0 a2=3 a3=0 items=0 ppid=1 pid=4910 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:38.731597 kernel: audit: type=1300 audit(1747301018.686:1400): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3acd3cf0 a2=3 a3=0 items=0 ppid=1 pid=4910 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:38.686000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 09:23:38.740037 systemd-logind[1148]: New session 11 of user core. May 15 09:23:38.742001 kernel: audit: type=1327 audit(1747301018.686:1400): proctitle=737368643A20636F7265205B707269765D May 15 09:23:38.741212 systemd[1]: Started session-11.scope. May 15 09:23:38.755000 audit[4910]: USER_START pid=4910 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:38.772619 kernel: audit: type=1105 audit(1747301018.755:1401): pid=4910 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:38.773000 audit[4912]: CRED_ACQ pid=4912 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:38.781282 kernel: audit: type=1103 audit(1747301018.773:1402): pid=4912 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:39.452874 sshd[4910]: pam_unix(sshd:session): session closed for user core May 15 09:23:39.455000 audit[4910]: USER_END pid=4910 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:39.455000 audit[4910]: CRED_DISP pid=4910 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:39.475988 systemd[1]: sshd@10-172.24.4.133:22-172.24.4.1:41880.service: Deactivated successfully. May 15 09:23:39.477788 systemd[1]: session-11.scope: Deactivated successfully. May 15 09:23:39.486895 kernel: audit: type=1106 audit(1747301019.455:1403): pid=4910 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:39.487194 kernel: audit: type=1104 audit(1747301019.455:1404): pid=4910 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:39.487108 systemd-logind[1148]: Session 11 logged out. Waiting for processes to exit. May 15 09:23:39.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.133:22-172.24.4.1:41880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:39.490194 systemd-logind[1148]: Removed session 11. May 15 09:23:43.812000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:23:43.817064 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 09:23:43.817276 kernel: audit: type=1400 audit(1747301023.812:1406): avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:23:43.812000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:23:43.849637 kernel: audit: type=1400 audit(1747301023.812:1407): avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:23:43.849853 kernel: audit: type=1300 audit(1747301023.812:1407): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000aa1460 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:23:43.812000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000aa1460 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:23:43.812000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:23:43.883041 kernel: audit: type=1327 audit(1747301023.812:1407): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:23:43.883217 kernel: audit: type=1300 audit(1747301023.812:1406): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000725ef0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:23:43.812000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000725ef0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:23:43.812000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:23:43.913580 kernel: audit: type=1327 audit(1747301023.812:1406): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:23:44.467431 systemd[1]: Started sshd@11-172.24.4.133:22-172.24.4.1:46382.service. May 15 09:23:44.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.133:22-172.24.4.1:46382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:44.483614 kernel: audit: type=1130 audit(1747301024.469:1408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.133:22-172.24.4.1:46382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:44.553000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:23:44.553000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c009892f30 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:23:44.585448 kernel: audit: type=1400 audit(1747301024.553:1409): avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:23:44.585671 kernel: audit: type=1300 audit(1747301024.553:1409): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c009892f30 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:23:44.553000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:23:44.605264 kernel: audit: type=1327 audit(1747301024.553:1409): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:23:44.602000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:23:44.602000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c006033c20 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:23:44.602000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:23:44.602000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:23:44.602000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c003a5a240 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:23:44.602000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:23:44.603000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:23:44.603000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00a0b47e0 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:23:44.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:23:44.603000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:23:44.603000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c006033d10 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:23:44.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:23:44.603000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:23:44.603000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c009893080 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:23:44.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:23:45.732000 audit[4924]: USER_ACCT pid=4924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:45.735268 sshd[4924]: Accepted publickey for core from 172.24.4.1 port 46382 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:23:45.736000 audit[4924]: CRED_ACQ pid=4924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:45.737000 audit[4924]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc15e1ce60 a2=3 a3=0 items=0 ppid=1 pid=4924 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:45.737000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 09:23:45.739580 sshd[4924]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:23:45.755851 systemd-logind[1148]: New session 12 of user core. May 15 09:23:45.761815 systemd[1]: Started session-12.scope. May 15 09:23:45.776000 audit[4924]: USER_START pid=4924 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:45.781000 audit[4929]: CRED_ACQ pid=4929 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:46.458428 sshd[4924]: pam_unix(sshd:session): session closed for user core May 15 09:23:46.460000 audit[4924]: USER_END pid=4924 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:46.460000 audit[4924]: CRED_DISP pid=4924 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:46.466025 systemd-logind[1148]: Session 12 logged out. Waiting for processes to exit. May 15 09:23:46.468321 systemd[1]: sshd@11-172.24.4.133:22-172.24.4.1:46382.service: Deactivated successfully. May 15 09:23:46.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.133:22-172.24.4.1:46382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:46.472764 systemd[1]: session-12.scope: Deactivated successfully. May 15 09:23:46.479075 systemd-logind[1148]: Removed session 12. May 15 09:23:47.126000 audit[4052]: AVC avc: denied { watch } for pid=4052 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_09_20_20.3686309504/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c808,c879 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c808,c879 tclass=file permissive=0 May 15 09:23:47.126000 audit[4052]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0017dc280 a2=fc6 a3=0 items=0 ppid=3296 pid=4052 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c808,c879 key=(null) May 15 09:23:47.126000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 09:23:48.513000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:23:48.513000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ad14a0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:23:48.513000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:23:48.515000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:23:48.515000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000586ec0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:23:48.515000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:23:48.515000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:23:48.515000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000586ee0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:23:48.515000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:23:48.518000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:23:48.518000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ad1520 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:23:48.518000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:23:49.012460 systemd[1]: run-containerd-runc-k8s.io-a971b5e40d66e250b96d4cd763b06b9a123d362b996aebd9957752bb747b6281-runc.K2AedW.mount: Deactivated successfully. May 15 09:23:50.903697 systemd[1]: run-containerd-runc-k8s.io-a971b5e40d66e250b96d4cd763b06b9a123d362b996aebd9957752bb747b6281-runc.OzwDr7.mount: Deactivated successfully. May 15 09:23:51.474500 systemd[1]: Started sshd@12-172.24.4.133:22-172.24.4.1:46384.service. May 15 09:23:51.482793 kernel: kauditd_printk_skb: 40 callbacks suppressed May 15 09:23:51.483208 kernel: audit: type=1130 audit(1747301031.477:1428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.133:22-172.24.4.1:46384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:51.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.133:22-172.24.4.1:46384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:52.701000 audit[4997]: USER_ACCT pid=4997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:52.705036 sshd[4997]: Accepted publickey for core from 172.24.4.1 port 46384 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:23:52.719000 audit[4997]: CRED_ACQ pid=4997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:52.722231 sshd[4997]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:23:52.736288 kernel: audit: type=1101 audit(1747301032.701:1429): pid=4997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:52.736492 kernel: audit: type=1103 audit(1747301032.719:1430): pid=4997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:52.746609 kernel: audit: type=1006 audit(1747301032.719:1431): pid=4997 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 15 09:23:52.746818 kernel: audit: type=1300 audit(1747301032.719:1431): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe5b06a50 a2=3 a3=0 items=0 ppid=1 pid=4997 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:52.719000 audit[4997]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe5b06a50 a2=3 a3=0 items=0 ppid=1 pid=4997 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:52.719000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 09:23:52.767607 kernel: audit: type=1327 audit(1747301032.719:1431): proctitle=737368643A20636F7265205B707269765D May 15 09:23:52.777647 systemd-logind[1148]: New session 13 of user core. May 15 09:23:52.779566 systemd[1]: Started session-13.scope. May 15 09:23:52.796000 audit[4997]: USER_START pid=4997 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:52.813703 kernel: audit: type=1105 audit(1747301032.796:1432): pid=4997 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:52.814000 audit[4999]: CRED_ACQ pid=4999 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:52.855706 kernel: audit: type=1103 audit(1747301032.814:1433): pid=4999 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:53.400000 audit[4468]: AVC avc: denied { watch } for pid=4468 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_09_20_20.1273244570/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c673 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c214,c673 tclass=file permissive=0 May 15 09:23:53.421963 kernel: audit: type=1400 audit(1747301033.400:1434): avc: denied { watch } for pid=4468 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_09_20_20.1273244570/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c673 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c214,c673 tclass=file permissive=0 May 15 09:23:53.422160 kernel: audit: type=1300 audit(1747301033.400:1434): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0012a61c0 a2=fc6 a3=0 items=0 ppid=3720 pid=4468 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c673 key=(null) May 15 09:23:53.400000 audit[4468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0012a61c0 a2=fc6 a3=0 items=0 ppid=3720 pid=4468 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c673 key=(null) May 15 09:23:53.400000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 09:23:53.486160 sshd[4997]: pam_unix(sshd:session): session closed for user core May 15 09:23:53.487000 audit[4997]: USER_END pid=4997 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:53.488000 audit[4997]: CRED_DISP pid=4997 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:53.492569 systemd[1]: sshd@12-172.24.4.133:22-172.24.4.1:46384.service: Deactivated successfully. May 15 09:23:53.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.133:22-172.24.4.1:46384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:53.499469 systemd[1]: session-13.scope: Deactivated successfully. May 15 09:23:53.503694 systemd-logind[1148]: Session 13 logged out. Waiting for processes to exit. May 15 09:23:53.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.133:22-172.24.4.1:46944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:53.510118 systemd[1]: Started sshd@13-172.24.4.133:22-172.24.4.1:46944.service. May 15 09:23:53.519731 systemd-logind[1148]: Removed session 13. May 15 09:23:54.887000 audit[5010]: USER_ACCT pid=5010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:54.888654 sshd[5010]: Accepted publickey for core from 172.24.4.1 port 46944 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:23:54.890000 audit[5010]: CRED_ACQ pid=5010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:54.891000 audit[5010]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4ce9d900 a2=3 a3=0 items=0 ppid=1 pid=5010 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:54.891000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 09:23:54.892929 sshd[5010]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:23:54.903369 systemd-logind[1148]: New session 14 of user core. May 15 09:23:54.905297 systemd[1]: Started session-14.scope. May 15 09:23:54.920000 audit[5010]: USER_START pid=5010 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:54.924000 audit[5012]: CRED_ACQ pid=5012 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:55.731290 sshd[5010]: pam_unix(sshd:session): session closed for user core May 15 09:23:55.737000 audit[5010]: USER_END pid=5010 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:55.737000 audit[5010]: CRED_DISP pid=5010 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:55.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.133:22-172.24.4.1:46950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:55.747901 systemd[1]: Started sshd@14-172.24.4.133:22-172.24.4.1:46950.service. May 15 09:23:55.750905 systemd[1]: sshd@13-172.24.4.133:22-172.24.4.1:46944.service: Deactivated successfully. May 15 09:23:55.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.133:22-172.24.4.1:46944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:55.754012 systemd[1]: session-14.scope: Deactivated successfully. May 15 09:23:55.756754 systemd-logind[1148]: Session 14 logged out. Waiting for processes to exit. May 15 09:23:55.759997 systemd-logind[1148]: Removed session 14. May 15 09:23:56.982000 audit[5020]: USER_ACCT pid=5020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:56.983717 sshd[5020]: Accepted publickey for core from 172.24.4.1 port 46950 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:23:56.987357 kernel: kauditd_printk_skb: 16 callbacks suppressed May 15 09:23:56.987508 kernel: audit: type=1101 audit(1747301036.982:1448): pid=5020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:56.993000 audit[5020]: CRED_ACQ pid=5020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:56.995416 sshd[5020]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:23:57.001590 kernel: audit: type=1103 audit(1747301036.993:1449): pid=5020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:56.993000 audit[5020]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd162d000 a2=3 a3=0 items=0 ppid=1 pid=5020 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:57.015596 kernel: audit: type=1006 audit(1747301036.993:1450): pid=5020 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 15 09:23:57.015823 kernel: audit: type=1300 audit(1747301036.993:1450): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd162d000 a2=3 a3=0 items=0 ppid=1 pid=5020 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:23:57.015892 kernel: audit: type=1327 audit(1747301036.993:1450): proctitle=737368643A20636F7265205B707269765D May 15 09:23:56.993000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 09:23:57.026590 systemd-logind[1148]: New session 15 of user core. May 15 09:23:57.030072 systemd[1]: Started session-15.scope. May 15 09:23:57.038000 audit[5020]: USER_START pid=5020 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:57.048872 kernel: audit: type=1105 audit(1747301037.038:1451): pid=5020 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:57.049074 kernel: audit: type=1103 audit(1747301037.047:1452): pid=5023 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:57.047000 audit[5023]: CRED_ACQ pid=5023 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:57.884106 sshd[5020]: pam_unix(sshd:session): session closed for user core May 15 09:23:57.885000 audit[5020]: USER_END pid=5020 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:57.888999 systemd[1]: sshd@14-172.24.4.133:22-172.24.4.1:46950.service: Deactivated successfully. May 15 09:23:57.890836 systemd[1]: session-15.scope: Deactivated successfully. May 15 09:23:57.893770 systemd-logind[1148]: Session 15 logged out. Waiting for processes to exit. May 15 09:23:57.895744 systemd-logind[1148]: Removed session 15. May 15 09:23:57.885000 audit[5020]: CRED_DISP pid=5020 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:57.916765 kernel: audit: type=1106 audit(1747301037.885:1453): pid=5020 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:57.916973 kernel: audit: type=1104 audit(1747301037.885:1454): pid=5020 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:23:57.917033 kernel: audit: type=1131 audit(1747301037.885:1455): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.133:22-172.24.4.1:46950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:23:57.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.133:22-172.24.4.1:46950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:02.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.133:22-172.24.4.1:46960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:02.896506 systemd[1]: Started sshd@15-172.24.4.133:22-172.24.4.1:46960.service. May 15 09:24:02.910926 kernel: audit: type=1130 audit(1747301042.896:1456): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.133:22-172.24.4.1:46960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:04.327944 sshd[5038]: Accepted publickey for core from 172.24.4.1 port 46960 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:24:04.327000 audit[5038]: USER_ACCT pid=5038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:04.345000 audit[5038]: CRED_ACQ pid=5038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:04.347856 sshd[5038]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:24:04.362988 kernel: audit: type=1101 audit(1747301044.327:1457): pid=5038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:04.363191 kernel: audit: type=1103 audit(1747301044.345:1458): pid=5038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:04.373585 kernel: audit: type=1006 audit(1747301044.345:1459): pid=5038 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 15 09:24:04.345000 audit[5038]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0c74b140 a2=3 a3=0 items=0 ppid=1 pid=5038 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.389637 kernel: audit: type=1300 audit(1747301044.345:1459): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0c74b140 a2=3 a3=0 items=0 ppid=1 pid=5038 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:04.345000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 09:24:04.396770 kernel: audit: type=1327 audit(1747301044.345:1459): proctitle=737368643A20636F7265205B707269765D May 15 09:24:04.397078 systemd-logind[1148]: New session 16 of user core. May 15 09:24:04.399227 systemd[1]: Started session-16.scope. May 15 09:24:04.408000 audit[5038]: USER_START pid=5038 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:04.415000 audit[5041]: CRED_ACQ pid=5041 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:04.421996 kernel: audit: type=1105 audit(1747301044.408:1460): pid=5038 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:04.422140 kernel: audit: type=1103 audit(1747301044.415:1461): pid=5041 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:04.797978 systemd[1]: run-containerd-runc-k8s.io-1baed0fd5b8d0f5e87561ba7eefc4e63950f1175bfd80637fdcbe4853b78964c-runc.1hRUrR.mount: Deactivated successfully. May 15 09:24:05.067469 sshd[5038]: pam_unix(sshd:session): session closed for user core May 15 09:24:05.072000 audit[5038]: USER_END pid=5038 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:05.090267 systemd[1]: sshd@15-172.24.4.133:22-172.24.4.1:46960.service: Deactivated successfully. May 15 09:24:05.091047 kernel: audit: type=1106 audit(1747301045.072:1462): pid=5038 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:05.092406 systemd[1]: session-16.scope: Deactivated successfully. May 15 09:24:05.096955 systemd-logind[1148]: Session 16 logged out. Waiting for processes to exit. May 15 09:24:05.072000 audit[5038]: CRED_DISP pid=5038 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:05.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.133:22-172.24.4.1:46960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:05.111737 kernel: audit: type=1104 audit(1747301045.072:1463): pid=5038 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:05.114793 systemd-logind[1148]: Removed session 16. May 15 09:24:10.078390 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 09:24:10.078593 kernel: audit: type=1130 audit(1747301050.070:1465): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.133:22-172.24.4.1:60238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:10.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.133:22-172.24.4.1:60238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:10.070365 systemd[1]: Started sshd@16-172.24.4.133:22-172.24.4.1:60238.service. May 15 09:24:11.249000 audit[5073]: USER_ACCT pid=5073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:11.265467 sshd[5073]: Accepted publickey for core from 172.24.4.1 port 60238 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:24:11.266169 kernel: audit: type=1101 audit(1747301051.249:1466): pid=5073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:11.266869 sshd[5073]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:24:11.264000 audit[5073]: CRED_ACQ pid=5073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:11.288756 kernel: audit: type=1103 audit(1747301051.264:1467): pid=5073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:11.288935 kernel: audit: type=1006 audit(1747301051.265:1468): pid=5073 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 15 09:24:11.265000 audit[5073]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe76207560 a2=3 a3=0 items=0 ppid=1 pid=5073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:11.306816 systemd[1]: Started session-17.scope. May 15 09:24:11.307744 systemd-logind[1148]: New session 17 of user core. May 15 09:24:11.314775 kernel: audit: type=1300 audit(1747301051.265:1468): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe76207560 a2=3 a3=0 items=0 ppid=1 pid=5073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:11.265000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 09:24:11.321609 kernel: audit: type=1327 audit(1747301051.265:1468): proctitle=737368643A20636F7265205B707269765D May 15 09:24:11.327000 audit[5073]: USER_START pid=5073 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:11.341736 kernel: audit: type=1105 audit(1747301051.327:1469): pid=5073 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:11.341914 kernel: audit: type=1103 audit(1747301051.331:1470): pid=5075 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:11.331000 audit[5075]: CRED_ACQ pid=5075 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:12.084009 sshd[5073]: pam_unix(sshd:session): session closed for user core May 15 09:24:12.086000 audit[5073]: USER_END pid=5073 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:12.105759 kernel: audit: type=1106 audit(1747301052.086:1471): pid=5073 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:12.106266 systemd[1]: sshd@16-172.24.4.133:22-172.24.4.1:60238.service: Deactivated successfully. May 15 09:24:12.086000 audit[5073]: CRED_DISP pid=5073 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:12.108044 systemd[1]: session-17.scope: Deactivated successfully. May 15 09:24:12.121616 kernel: audit: type=1104 audit(1747301052.086:1472): pid=5073 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:12.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.133:22-172.24.4.1:60238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:12.122663 systemd-logind[1148]: Session 17 logged out. Waiting for processes to exit. May 15 09:24:12.125686 systemd-logind[1148]: Removed session 17. May 15 09:24:17.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.133:22-172.24.4.1:45288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:17.120706 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 09:24:17.121131 kernel: audit: type=1130 audit(1747301057.102:1474): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.133:22-172.24.4.1:45288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:17.102681 systemd[1]: Started sshd@17-172.24.4.133:22-172.24.4.1:45288.service. May 15 09:24:18.653587 sshd[5086]: Accepted publickey for core from 172.24.4.1 port 45288 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:24:18.652000 audit[5086]: USER_ACCT pid=5086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:18.669757 kernel: audit: type=1101 audit(1747301058.652:1475): pid=5086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:18.669000 audit[5086]: CRED_ACQ pid=5086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:18.670760 sshd[5086]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:24:18.684609 kernel: audit: type=1103 audit(1747301058.669:1476): pid=5086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:18.694584 kernel: audit: type=1006 audit(1747301058.669:1477): pid=5086 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 15 09:24:18.669000 audit[5086]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc111b0b0 a2=3 a3=0 items=0 ppid=1 pid=5086 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:18.669000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 09:24:18.716598 kernel: audit: type=1300 audit(1747301058.669:1477): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc111b0b0 a2=3 a3=0 items=0 ppid=1 pid=5086 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:18.716738 kernel: audit: type=1327 audit(1747301058.669:1477): proctitle=737368643A20636F7265205B707269765D May 15 09:24:18.720708 systemd-logind[1148]: New session 18 of user core. May 15 09:24:18.722991 systemd[1]: Started session-18.scope. May 15 09:24:18.742000 audit[5086]: USER_START pid=5086 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:18.760579 kernel: audit: type=1105 audit(1747301058.742:1478): pid=5086 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:18.760000 audit[5088]: CRED_ACQ pid=5088 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:18.775600 kernel: audit: type=1103 audit(1747301058.760:1479): pid=5088 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:19.447209 sshd[5086]: pam_unix(sshd:session): session closed for user core May 15 09:24:19.458000 audit[5086]: USER_END pid=5086 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:19.479004 kernel: audit: type=1106 audit(1747301059.458:1480): pid=5086 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:19.458000 audit[5086]: CRED_DISP pid=5086 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:19.491489 systemd[1]: Started sshd@18-172.24.4.133:22-172.24.4.1:45290.service. May 15 09:24:19.493194 systemd[1]: sshd@17-172.24.4.133:22-172.24.4.1:45288.service: Deactivated successfully. May 15 09:24:19.497679 kernel: audit: type=1104 audit(1747301059.458:1481): pid=5086 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:19.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.133:22-172.24.4.1:45290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:19.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.133:22-172.24.4.1:45288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:19.499925 systemd[1]: session-18.scope: Deactivated successfully. May 15 09:24:19.503030 systemd-logind[1148]: Session 18 logged out. Waiting for processes to exit. May 15 09:24:19.511026 systemd-logind[1148]: Removed session 18. May 15 09:24:20.676000 audit[5097]: USER_ACCT pid=5097 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:20.677997 sshd[5097]: Accepted publickey for core from 172.24.4.1 port 45290 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:24:20.679000 audit[5097]: CRED_ACQ pid=5097 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:20.679000 audit[5097]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdea164ab0 a2=3 a3=0 items=0 ppid=1 pid=5097 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:20.679000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 09:24:20.680540 sshd[5097]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:24:20.690667 systemd[1]: Started session-19.scope. May 15 09:24:20.691777 systemd-logind[1148]: New session 19 of user core. May 15 09:24:20.701000 audit[5097]: USER_START pid=5097 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:20.704000 audit[5100]: CRED_ACQ pid=5100 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:20.930466 systemd[1]: run-containerd-runc-k8s.io-a971b5e40d66e250b96d4cd763b06b9a123d362b996aebd9957752bb747b6281-runc.oFCbqH.mount: Deactivated successfully. May 15 09:24:21.742991 sshd[5097]: pam_unix(sshd:session): session closed for user core May 15 09:24:21.750276 systemd[1]: Started sshd@19-172.24.4.133:22-172.24.4.1:45302.service. May 15 09:24:21.751000 audit[5097]: USER_END pid=5097 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:21.751000 audit[5097]: CRED_DISP pid=5097 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:21.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.133:22-172.24.4.1:45302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:21.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.133:22-172.24.4.1:45290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:21.758163 systemd[1]: sshd@18-172.24.4.133:22-172.24.4.1:45290.service: Deactivated successfully. May 15 09:24:21.760092 systemd[1]: session-19.scope: Deactivated successfully. May 15 09:24:21.765423 systemd-logind[1148]: Session 19 logged out. Waiting for processes to exit. May 15 09:24:21.768332 systemd-logind[1148]: Removed session 19. May 15 09:24:22.896000 audit[5124]: USER_ACCT pid=5124 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:22.898328 sshd[5124]: Accepted publickey for core from 172.24.4.1 port 45302 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:24:22.899903 kernel: kauditd_printk_skb: 13 callbacks suppressed May 15 09:24:22.900196 kernel: audit: type=1101 audit(1747301062.896:1493): pid=5124 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:22.914000 audit[5124]: CRED_ACQ pid=5124 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:22.916025 sshd[5124]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:24:22.938280 kernel: audit: type=1103 audit(1747301062.914:1494): pid=5124 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:22.948651 kernel: audit: type=1006 audit(1747301062.914:1495): pid=5124 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 May 15 09:24:22.914000 audit[5124]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2a1c2490 a2=3 a3=0 items=0 ppid=1 pid=5124 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:22.967220 kernel: audit: type=1300 audit(1747301062.914:1495): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2a1c2490 a2=3 a3=0 items=0 ppid=1 pid=5124 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:22.967412 kernel: audit: type=1327 audit(1747301062.914:1495): proctitle=737368643A20636F7265205B707269765D May 15 09:24:22.914000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 09:24:22.972126 systemd-logind[1148]: New session 20 of user core. May 15 09:24:22.974179 systemd[1]: Started session-20.scope. May 15 09:24:22.987000 audit[5124]: USER_START pid=5124 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:23.006496 kernel: audit: type=1105 audit(1747301062.987:1496): pid=5124 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:23.006868 kernel: audit: type=1103 audit(1747301063.005:1497): pid=5127 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:23.005000 audit[5127]: CRED_ACQ pid=5127 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:26.346000 audit[5156]: NETFILTER_CFG table=filter:118 family=2 entries=20 op=nft_register_rule pid=5156 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:24:26.346000 audit[5156]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffcfcd0cf90 a2=0 a3=7ffcfcd0cf7c items=0 ppid=2126 pid=5156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:26.360228 kernel: audit: type=1325 audit(1747301066.346:1498): table=filter:118 family=2 entries=20 op=nft_register_rule pid=5156 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:24:26.360500 kernel: audit: type=1300 audit(1747301066.346:1498): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffcfcd0cf90 a2=0 a3=7ffcfcd0cf7c items=0 ppid=2126 pid=5156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:26.346000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:24:26.365590 kernel: audit: type=1327 audit(1747301066.346:1498): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:24:26.369000 audit[5156]: NETFILTER_CFG table=nat:119 family=2 entries=22 op=nft_register_rule pid=5156 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:24:26.369000 audit[5156]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcfcd0cf90 a2=0 a3=0 items=0 ppid=2126 pid=5156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:26.369000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:24:26.390000 audit[5158]: NETFILTER_CFG table=filter:120 family=2 entries=32 op=nft_register_rule pid=5158 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:24:26.390000 audit[5158]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc37658040 a2=0 a3=7ffc3765802c items=0 ppid=2126 pid=5158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:26.390000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:24:26.403000 audit[5158]: NETFILTER_CFG table=nat:121 family=2 entries=22 op=nft_register_rule pid=5158 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:24:26.403000 audit[5158]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc37658040 a2=0 a3=0 items=0 ppid=2126 pid=5158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:26.403000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:24:26.680155 sshd[5124]: pam_unix(sshd:session): session closed for user core May 15 09:24:26.691000 audit[5124]: USER_END pid=5124 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:26.692000 audit[5124]: CRED_DISP pid=5124 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:26.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.133:22-172.24.4.1:55354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:26.697912 systemd[1]: Started sshd@20-172.24.4.133:22-172.24.4.1:55354.service. May 15 09:24:26.703347 systemd[1]: sshd@19-172.24.4.133:22-172.24.4.1:45302.service: Deactivated successfully. May 15 09:24:26.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.133:22-172.24.4.1:45302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:26.710638 systemd[1]: session-20.scope: Deactivated successfully. May 15 09:24:26.711030 systemd[1]: session-20.scope: Consumed 1.076s CPU time. May 15 09:24:26.714054 systemd-logind[1148]: Session 20 logged out. Waiting for processes to exit. May 15 09:24:26.718856 systemd-logind[1148]: Removed session 20. May 15 09:24:27.735000 audit[5160]: USER_ACCT pid=5160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:27.736365 sshd[5160]: Accepted publickey for core from 172.24.4.1 port 55354 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:24:27.737000 audit[5160]: CRED_ACQ pid=5160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:27.737000 audit[5160]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0f9b7120 a2=3 a3=0 items=0 ppid=1 pid=5160 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:27.737000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 09:24:27.739310 sshd[5160]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:24:27.751361 systemd-logind[1148]: New session 21 of user core. May 15 09:24:27.751842 systemd[1]: Started session-21.scope. May 15 09:24:27.766000 audit[5160]: USER_START pid=5160 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:27.769000 audit[5163]: CRED_ACQ pid=5163 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:28.808087 sshd[5160]: pam_unix(sshd:session): session closed for user core May 15 09:24:28.819654 kernel: kauditd_printk_skb: 20 callbacks suppressed May 15 09:24:28.819788 kernel: audit: type=1106 audit(1747301068.808:1511): pid=5160 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:28.808000 audit[5160]: USER_END pid=5160 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:28.813002 systemd[1]: sshd@20-172.24.4.133:22-172.24.4.1:55354.service: Deactivated successfully. May 15 09:24:28.809000 audit[5160]: CRED_DISP pid=5160 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:28.826942 systemd[1]: Started sshd@21-172.24.4.133:22-172.24.4.1:55368.service. May 15 09:24:28.828110 systemd[1]: session-21.scope: Deactivated successfully. May 15 09:24:28.828603 kernel: audit: type=1104 audit(1747301068.809:1512): pid=5160 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:28.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.133:22-172.24.4.1:55354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:28.844058 kernel: audit: type=1131 audit(1747301068.812:1513): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.133:22-172.24.4.1:55354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:28.843727 systemd-logind[1148]: Session 21 logged out. Waiting for processes to exit. May 15 09:24:28.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.133:22-172.24.4.1:55368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:28.851314 systemd-logind[1148]: Removed session 21. May 15 09:24:28.851658 kernel: audit: type=1130 audit(1747301068.826:1514): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.133:22-172.24.4.1:55368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:30.196000 audit[5170]: USER_ACCT pid=5170 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:30.212192 sshd[5170]: Accepted publickey for core from 172.24.4.1 port 55368 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:24:30.212847 kernel: audit: type=1101 audit(1747301070.196:1515): pid=5170 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:30.214000 audit[5170]: CRED_ACQ pid=5170 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:30.216967 sshd[5170]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:24:30.224667 kernel: audit: type=1103 audit(1747301070.214:1516): pid=5170 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:30.232646 kernel: audit: type=1006 audit(1747301070.215:1517): pid=5170 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 15 09:24:30.215000 audit[5170]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc218a5b20 a2=3 a3=0 items=0 ppid=1 pid=5170 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:30.249592 kernel: audit: type=1300 audit(1747301070.215:1517): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc218a5b20 a2=3 a3=0 items=0 ppid=1 pid=5170 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:30.215000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 09:24:30.255619 kernel: audit: type=1327 audit(1747301070.215:1517): proctitle=737368643A20636F7265205B707269765D May 15 09:24:30.264370 systemd[1]: Started session-22.scope. May 15 09:24:30.267751 systemd-logind[1148]: New session 22 of user core. May 15 09:24:30.290000 audit[5170]: USER_START pid=5170 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:30.309590 kernel: audit: type=1105 audit(1747301070.290:1518): pid=5170 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:30.292000 audit[5172]: CRED_ACQ pid=5172 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:30.948133 sshd[5170]: pam_unix(sshd:session): session closed for user core May 15 09:24:30.951000 audit[5170]: USER_END pid=5170 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:30.952000 audit[5170]: CRED_DISP pid=5170 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:30.956506 systemd[1]: sshd@21-172.24.4.133:22-172.24.4.1:55368.service: Deactivated successfully. May 15 09:24:30.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.133:22-172.24.4.1:55368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:30.958797 systemd[1]: session-22.scope: Deactivated successfully. May 15 09:24:30.960940 systemd-logind[1148]: Session 22 logged out. Waiting for processes to exit. May 15 09:24:30.964230 systemd-logind[1148]: Removed session 22. May 15 09:24:34.820071 systemd[1]: run-containerd-runc-k8s.io-1baed0fd5b8d0f5e87561ba7eefc4e63950f1175bfd80637fdcbe4853b78964c-runc.7IbepY.mount: Deactivated successfully. May 15 09:24:35.575000 audit[5204]: NETFILTER_CFG table=filter:122 family=2 entries=20 op=nft_register_rule pid=5204 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:24:35.578164 kernel: kauditd_printk_skb: 4 callbacks suppressed May 15 09:24:35.578252 kernel: audit: type=1325 audit(1747301075.575:1523): table=filter:122 family=2 entries=20 op=nft_register_rule pid=5204 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:24:35.575000 audit[5204]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffcf6c0cb60 a2=0 a3=7ffcf6c0cb4c items=0 ppid=2126 pid=5204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:35.589459 kernel: audit: type=1300 audit(1747301075.575:1523): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffcf6c0cb60 a2=0 a3=7ffcf6c0cb4c items=0 ppid=2126 pid=5204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:35.589642 kernel: audit: type=1327 audit(1747301075.575:1523): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:24:35.575000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:24:35.599000 audit[5204]: NETFILTER_CFG table=nat:123 family=2 entries=106 op=nft_register_chain pid=5204 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:24:35.599000 audit[5204]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffcf6c0cb60 a2=0 a3=7ffcf6c0cb4c items=0 ppid=2126 pid=5204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:35.612906 kernel: audit: type=1325 audit(1747301075.599:1524): table=nat:123 family=2 entries=106 op=nft_register_chain pid=5204 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 09:24:35.613064 kernel: audit: type=1300 audit(1747301075.599:1524): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffcf6c0cb60 a2=0 a3=7ffcf6c0cb4c items=0 ppid=2126 pid=5204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:35.599000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:24:35.617193 kernel: audit: type=1327 audit(1747301075.599:1524): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 09:24:35.957130 systemd[1]: Started sshd@22-172.24.4.133:22-172.24.4.1:45784.service. May 15 09:24:35.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.133:22-172.24.4.1:45784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:35.965567 kernel: audit: type=1130 audit(1747301075.958:1525): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.133:22-172.24.4.1:45784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:37.321000 audit[5207]: USER_ACCT pid=5207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:37.323667 sshd[5207]: Accepted publickey for core from 172.24.4.1 port 45784 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:24:37.325720 sshd[5207]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:24:37.329563 kernel: audit: type=1101 audit(1747301077.321:1526): pid=5207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:37.321000 audit[5207]: CRED_ACQ pid=5207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:37.338593 kernel: audit: type=1103 audit(1747301077.321:1527): pid=5207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:37.338730 kernel: audit: type=1006 audit(1747301077.321:1528): pid=5207 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 15 09:24:37.344320 systemd[1]: Started session-23.scope. May 15 09:24:37.344729 systemd-logind[1148]: New session 23 of user core. May 15 09:24:37.321000 audit[5207]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9059c640 a2=3 a3=0 items=0 ppid=1 pid=5207 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:37.321000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 09:24:37.363000 audit[5207]: USER_START pid=5207 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:37.365000 audit[5209]: CRED_ACQ pid=5209 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:38.085111 sshd[5207]: pam_unix(sshd:session): session closed for user core May 15 09:24:38.092000 audit[5207]: USER_END pid=5207 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:38.093000 audit[5207]: CRED_DISP pid=5207 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:38.100510 systemd[1]: sshd@22-172.24.4.133:22-172.24.4.1:45784.service: Deactivated successfully. May 15 09:24:38.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.133:22-172.24.4.1:45784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:38.112694 systemd[1]: session-23.scope: Deactivated successfully. May 15 09:24:38.118037 systemd-logind[1148]: Session 23 logged out. Waiting for processes to exit. May 15 09:24:38.124187 systemd-logind[1148]: Removed session 23. May 15 09:24:43.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.133:22-172.24.4.1:45798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:43.103321 systemd[1]: Started sshd@23-172.24.4.133:22-172.24.4.1:45798.service. May 15 09:24:43.111364 kernel: kauditd_printk_skb: 7 callbacks suppressed May 15 09:24:43.111783 kernel: audit: type=1130 audit(1747301083.103:1534): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.133:22-172.24.4.1:45798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:43.815000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:24:43.815000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:24:43.862227 kernel: audit: type=1400 audit(1747301083.815:1536): avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:24:43.862511 kernel: audit: type=1400 audit(1747301083.815:1535): avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:24:43.862689 kernel: audit: type=1300 audit(1747301083.815:1535): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0031c0220 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:24:43.815000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0031c0220 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:24:43.815000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:24:43.895901 kernel: audit: type=1327 audit(1747301083.815:1535): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:24:43.896107 kernel: audit: type=1300 audit(1747301083.815:1536): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00247e570 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:24:43.815000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00247e570 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:24:43.815000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:24:43.910994 kernel: audit: type=1327 audit(1747301083.815:1536): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:24:44.343000 audit[5219]: USER_ACCT pid=5219 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:44.345132 sshd[5219]: Accepted publickey for core from 172.24.4.1 port 45798 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:24:44.360797 kernel: audit: type=1101 audit(1747301084.343:1537): pid=5219 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:44.361969 sshd[5219]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:24:44.360000 audit[5219]: CRED_ACQ pid=5219 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:44.378607 kernel: audit: type=1103 audit(1747301084.360:1538): pid=5219 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:44.392684 kernel: audit: type=1006 audit(1747301084.360:1539): pid=5219 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 15 09:24:44.360000 audit[5219]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4356f370 a2=3 a3=0 items=0 ppid=1 pid=5219 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:44.360000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 09:24:44.401308 systemd-logind[1148]: New session 24 of user core. May 15 09:24:44.404445 systemd[1]: Started session-24.scope. May 15 09:24:44.427000 audit[5219]: USER_START pid=5219 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:44.432000 audit[5221]: CRED_ACQ pid=5221 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:44.554000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:24:44.554000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c010731c50 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:24:44.554000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:24:44.603000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:24:44.603000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:24:44.603000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00c67c700 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:24:44.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:24:44.605000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:24:44.605000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c010806210 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:24:44.605000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:24:44.606000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:24:44.606000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c010806390 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:24:44.606000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:24:44.607000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:24:44.607000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00c67cae0 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:24:44.607000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:24:44.603000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c010731cb0 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:24:44.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:24:45.334350 sshd[5219]: pam_unix(sshd:session): session closed for user core May 15 09:24:45.336000 audit[5219]: USER_END pid=5219 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:45.336000 audit[5219]: CRED_DISP pid=5219 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:45.341344 systemd[1]: sshd@23-172.24.4.133:22-172.24.4.1:45798.service: Deactivated successfully. May 15 09:24:45.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.133:22-172.24.4.1:45798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:45.345818 systemd[1]: session-24.scope: Deactivated successfully. May 15 09:24:45.350723 systemd-logind[1148]: Session 24 logged out. Waiting for processes to exit. May 15 09:24:45.353333 systemd-logind[1148]: Removed session 24. May 15 09:24:47.131000 audit[4052]: AVC avc: denied { watch } for pid=4052 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_09_20_20.3686309504/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c808,c879 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c808,c879 tclass=file permissive=0 May 15 09:24:47.131000 audit[4052]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000a13360 a2=fc6 a3=0 items=0 ppid=3296 pid=4052 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c808,c879 key=(null) May 15 09:24:47.131000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 09:24:48.518000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:24:48.523206 kernel: kauditd_printk_skb: 28 callbacks suppressed May 15 09:24:48.523390 kernel: audit: type=1400 audit(1747301088.518:1552): avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:24:48.518000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0032604a0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:24:48.555827 kernel: audit: type=1300 audit(1747301088.518:1552): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0032604a0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:24:48.556063 kernel: audit: type=1327 audit(1747301088.518:1552): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:24:48.518000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:24:48.518000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:24:48.595965 kernel: audit: type=1400 audit(1747301088.518:1553): avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:24:48.518000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0031c04c0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:24:48.518000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:24:48.641354 kernel: audit: type=1300 audit(1747301088.518:1553): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0031c04c0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:24:48.641457 kernel: audit: type=1327 audit(1747301088.518:1553): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:24:48.518000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:24:48.518000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0032604c0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:24:48.656891 kernel: audit: type=1400 audit(1747301088.518:1554): avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:24:48.656986 kernel: audit: type=1300 audit(1747301088.518:1554): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0032604c0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:24:48.657034 kernel: audit: type=1327 audit(1747301088.518:1554): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:24:48.518000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:24:48.518000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:24:48.669290 kernel: audit: type=1400 audit(1747301088.518:1555): avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:24:48.518000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0031c0660 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:24:48.518000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:24:49.022358 systemd[1]: run-containerd-runc-k8s.io-a971b5e40d66e250b96d4cd763b06b9a123d362b996aebd9957752bb747b6281-runc.QXMwWH.mount: Deactivated successfully. May 15 09:24:50.349963 systemd[1]: Started sshd@24-172.24.4.133:22-172.24.4.1:43070.service. May 15 09:24:50.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.133:22-172.24.4.1:43070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:50.877990 systemd[1]: run-containerd-runc-k8s.io-a971b5e40d66e250b96d4cd763b06b9a123d362b996aebd9957752bb747b6281-runc.jBACum.mount: Deactivated successfully. May 15 09:24:51.669000 audit[5252]: USER_ACCT pid=5252 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:51.670846 sshd[5252]: Accepted publickey for core from 172.24.4.1 port 43070 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:24:51.672000 audit[5252]: CRED_ACQ pid=5252 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:51.672000 audit[5252]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe756336e0 a2=3 a3=0 items=0 ppid=1 pid=5252 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:51.672000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 09:24:51.674444 sshd[5252]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:24:51.685652 systemd-logind[1148]: New session 25 of user core. May 15 09:24:51.686688 systemd[1]: Started session-25.scope. May 15 09:24:51.701000 audit[5252]: USER_START pid=5252 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:51.705000 audit[5274]: CRED_ACQ pid=5274 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:52.631026 sshd[5252]: pam_unix(sshd:session): session closed for user core May 15 09:24:52.633000 audit[5252]: USER_END pid=5252 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:52.633000 audit[5252]: CRED_DISP pid=5252 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:52.637951 systemd-logind[1148]: Session 25 logged out. Waiting for processes to exit. May 15 09:24:52.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.133:22-172.24.4.1:43070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:52.639116 systemd[1]: sshd@24-172.24.4.133:22-172.24.4.1:43070.service: Deactivated successfully. May 15 09:24:52.641189 systemd[1]: session-25.scope: Deactivated successfully. May 15 09:24:52.643798 systemd-logind[1148]: Removed session 25. May 15 09:24:53.404000 audit[4468]: AVC avc: denied { watch } for pid=4468 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_09_20_20.1273244570/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c673 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c214,c673 tclass=file permissive=0 May 15 09:24:53.404000 audit[4468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0012a6960 a2=fc6 a3=0 items=0 ppid=3720 pid=4468 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c673 key=(null) May 15 09:24:53.404000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 09:24:57.643730 systemd[1]: Started sshd@25-172.24.4.133:22-172.24.4.1:51624.service. May 15 09:24:57.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.133:22-172.24.4.1:51624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:57.649686 kernel: kauditd_printk_skb: 16 callbacks suppressed May 15 09:24:57.649857 kernel: audit: type=1130 audit(1747301097.644:1566): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.133:22-172.24.4.1:51624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:58.790000 audit[5286]: USER_ACCT pid=5286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:58.795491 sshd[5286]: Accepted publickey for core from 172.24.4.1 port 51624 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:24:58.806578 kernel: audit: type=1101 audit(1747301098.790:1567): pid=5286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:58.806000 audit[5286]: CRED_ACQ pid=5286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:58.808939 sshd[5286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:24:58.822663 kernel: audit: type=1103 audit(1747301098.806:1568): pid=5286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:58.833557 kernel: audit: type=1006 audit(1747301098.806:1569): pid=5286 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 15 09:24:58.833788 kernel: audit: type=1300 audit(1747301098.806:1569): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc063f14d0 a2=3 a3=0 items=0 ppid=1 pid=5286 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:58.806000 audit[5286]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc063f14d0 a2=3 a3=0 items=0 ppid=1 pid=5286 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:24:58.806000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 09:24:58.853741 kernel: audit: type=1327 audit(1747301098.806:1569): proctitle=737368643A20636F7265205B707269765D May 15 09:24:58.857711 systemd-logind[1148]: New session 26 of user core. May 15 09:24:58.859484 systemd[1]: Started session-26.scope. May 15 09:24:58.878000 audit[5286]: USER_START pid=5286 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:58.897701 kernel: audit: type=1105 audit(1747301098.878:1570): pid=5286 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:58.883000 audit[5288]: CRED_ACQ pid=5288 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:58.905640 kernel: audit: type=1103 audit(1747301098.883:1571): pid=5288 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:59.577336 sshd[5286]: pam_unix(sshd:session): session closed for user core May 15 09:24:59.582000 audit[5286]: USER_END pid=5286 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:59.585000 audit[5286]: CRED_DISP pid=5286 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:59.604685 systemd[1]: sshd@25-172.24.4.133:22-172.24.4.1:51624.service: Deactivated successfully. May 15 09:24:59.609050 systemd[1]: session-26.scope: Deactivated successfully. May 15 09:24:59.614943 kernel: audit: type=1106 audit(1747301099.582:1572): pid=5286 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:59.615171 kernel: audit: type=1104 audit(1747301099.585:1573): pid=5286 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:24:59.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.133:22-172.24.4.1:51624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:24:59.619890 systemd-logind[1148]: Session 26 logged out. Waiting for processes to exit. May 15 09:24:59.623659 systemd-logind[1148]: Removed session 26. May 15 09:25:04.639303 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 09:25:04.640261 kernel: audit: type=1130 audit(1747301104.621:1575): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.24.4.133:22-172.24.4.1:37340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:25:04.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.24.4.133:22-172.24.4.1:37340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:25:04.621128 systemd[1]: Started sshd@26-172.24.4.133:22-172.24.4.1:37340.service. May 15 09:25:04.849170 systemd[1]: run-containerd-runc-k8s.io-1baed0fd5b8d0f5e87561ba7eefc4e63950f1175bfd80637fdcbe4853b78964c-runc.locSnd.mount: Deactivated successfully. May 15 09:25:05.787000 audit[5299]: USER_ACCT pid=5299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:25:05.790255 sshd[5299]: Accepted publickey for core from 172.24.4.1 port 37340 ssh2: RSA SHA256:vJ9zbjAuBHH28yvNJG1HWXfmUhMk1gBB/I91kXne7ic May 15 09:25:05.803907 kernel: audit: type=1101 audit(1747301105.787:1576): pid=5299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:25:05.803000 audit[5299]: CRED_ACQ pid=5299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:25:05.805507 sshd[5299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 09:25:05.820619 kernel: audit: type=1103 audit(1747301105.803:1577): pid=5299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:25:05.820809 kernel: audit: type=1006 audit(1747301105.804:1578): pid=5299 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 May 15 09:25:05.831004 kernel: audit: type=1300 audit(1747301105.804:1578): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd99ca9fa0 a2=3 a3=0 items=0 ppid=1 pid=5299 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:25:05.804000 audit[5299]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd99ca9fa0 a2=3 a3=0 items=0 ppid=1 pid=5299 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 09:25:05.804000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 09:25:05.851807 kernel: audit: type=1327 audit(1747301105.804:1578): proctitle=737368643A20636F7265205B707269765D May 15 09:25:05.860896 systemd-logind[1148]: New session 27 of user core. May 15 09:25:05.862072 systemd[1]: Started session-27.scope. May 15 09:25:05.877000 audit[5299]: USER_START pid=5299 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:25:05.882000 audit[5322]: CRED_ACQ pid=5322 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:25:05.907284 kernel: audit: type=1105 audit(1747301105.877:1579): pid=5299 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:25:05.907609 kernel: audit: type=1103 audit(1747301105.882:1580): pid=5322 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:25:06.742257 sshd[5299]: pam_unix(sshd:session): session closed for user core May 15 09:25:06.744000 audit[5299]: USER_END pid=5299 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:25:06.749341 systemd[1]: sshd@26-172.24.4.133:22-172.24.4.1:37340.service: Deactivated successfully. May 15 09:25:06.751521 systemd[1]: session-27.scope: Deactivated successfully. May 15 09:25:06.762622 kernel: audit: type=1106 audit(1747301106.744:1581): pid=5299 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:25:06.762790 kernel: audit: type=1104 audit(1747301106.745:1582): pid=5299 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:25:06.745000 audit[5299]: CRED_DISP pid=5299 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 09:25:06.776356 systemd-logind[1148]: Session 27 logged out. Waiting for processes to exit. May 15 09:25:06.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.24.4.133:22-172.24.4.1:37340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 09:25:06.782117 systemd-logind[1148]: Removed session 27. May 15 09:25:20.926224 systemd[1]: run-containerd-runc-k8s.io-a971b5e40d66e250b96d4cd763b06b9a123d362b996aebd9957752bb747b6281-runc.hxjPqi.mount: Deactivated successfully. May 15 09:25:34.852836 systemd[1]: run-containerd-runc-k8s.io-1baed0fd5b8d0f5e87561ba7eefc4e63950f1175bfd80637fdcbe4853b78964c-runc.iLNBIj.mount: Deactivated successfully. May 15 09:25:43.819000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:25:43.824744 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 09:25:43.825207 kernel: audit: type=1400 audit(1747301143.819:1584): avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:25:43.819000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0017761e0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:25:43.857223 kernel: audit: type=1300 audit(1747301143.819:1584): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0017761e0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:25:43.819000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:25:43.840000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:25:43.888110 kernel: audit: type=1327 audit(1747301143.819:1584): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:25:43.888427 kernel: audit: type=1400 audit(1747301143.840:1585): avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:25:43.888571 kernel: audit: type=1300 audit(1747301143.840:1585): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001661050 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:25:43.840000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001661050 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:25:43.840000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:25:43.911189 kernel: audit: type=1327 audit(1747301143.840:1585): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:25:44.555000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:25:44.572617 kernel: audit: type=1400 audit(1747301144.555:1586): avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:25:44.573352 kernel: audit: type=1300 audit(1747301144.555:1586): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c017a6f6b0 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:25:44.555000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c017a6f6b0 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:25:44.591595 kernel: audit: type=1327 audit(1747301144.555:1586): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:25:44.555000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:25:44.603000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:25:44.621670 kernel: audit: type=1400 audit(1747301144.603:1587): avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:25:44.603000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c015861cc0 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:25:44.603000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:25:44.605000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:25:44.605000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c017b98c90 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:25:44.605000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:25:44.607000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:25:44.607000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c015861d00 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:25:44.607000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:25:44.607000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:25:44.607000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c017a6f770 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:25:44.607000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:25:44.620000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:25:44.620000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c017b98de0 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:25:44.620000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:25:47.152000 audit[4052]: AVC avc: denied { watch } for pid=4052 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_09_20_20.3686309504/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c808,c879 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c808,c879 tclass=file permissive=0 May 15 09:25:47.152000 audit[4052]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00190c000 a2=fc6 a3=0 items=0 ppid=3296 pid=4052 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c808,c879 key=(null) May 15 09:25:47.152000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 09:25:48.519000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:25:48.519000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0017763c0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:25:48.519000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:25:48.519000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:25:48.519000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017763e0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:25:48.519000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:25:48.521000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:25:48.521000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001776780 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:25:48.521000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:25:48.523000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:25:48.523000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0017a89a0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:25:48.523000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:25:49.041444 systemd[1]: run-containerd-runc-k8s.io-a971b5e40d66e250b96d4cd763b06b9a123d362b996aebd9957752bb747b6281-runc.SkVT2R.mount: Deactivated successfully. May 15 09:25:50.871747 systemd[1]: run-containerd-runc-k8s.io-a971b5e40d66e250b96d4cd763b06b9a123d362b996aebd9957752bb747b6281-runc.o4Yw95.mount: Deactivated successfully. May 15 09:25:53.406000 audit[4468]: AVC avc: denied { watch } for pid=4468 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_09_20_20.1273244570/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c673 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c214,c673 tclass=file permissive=0 May 15 09:25:53.412340 kernel: kauditd_printk_skb: 29 callbacks suppressed May 15 09:25:53.412580 kernel: audit: type=1400 audit(1747301153.406:1597): avc: denied { watch } for pid=4468 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_09_20_20.1273244570/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c673 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c214,c673 tclass=file permissive=0 May 15 09:25:53.406000 audit[4468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0013bcce0 a2=fc6 a3=0 items=0 ppid=3720 pid=4468 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c673 key=(null) May 15 09:25:53.447251 kernel: audit: type=1300 audit(1747301153.406:1597): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0013bcce0 a2=fc6 a3=0 items=0 ppid=3720 pid=4468 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c673 key=(null) May 15 09:25:53.406000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 09:25:53.464642 kernel: audit: type=1327 audit(1747301153.406:1597): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 09:26:04.821202 systemd[1]: run-containerd-runc-k8s.io-1baed0fd5b8d0f5e87561ba7eefc4e63950f1175bfd80637fdcbe4853b78964c-runc.P7SeHE.mount: Deactivated successfully. May 15 09:26:11.695421 update_engine[1149]: I0515 09:26:11.694463 1149 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs May 15 09:26:11.695421 update_engine[1149]: I0515 09:26:11.694752 1149 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs May 15 09:26:11.702324 update_engine[1149]: I0515 09:26:11.701045 1149 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs May 15 09:26:11.704667 update_engine[1149]: I0515 09:26:11.704627 1149 omaha_request_params.cc:62] Current group set to lts May 15 09:26:11.711775 update_engine[1149]: I0515 09:26:11.711736 1149 update_attempter.cc:499] Already updated boot flags. Skipping. May 15 09:26:11.712047 update_engine[1149]: I0515 09:26:11.712014 1149 update_attempter.cc:643] Scheduling an action processor start. May 15 09:26:11.712483 update_engine[1149]: I0515 09:26:11.712447 1149 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction May 15 09:26:11.712862 update_engine[1149]: I0515 09:26:11.712828 1149 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs May 15 09:26:11.714122 update_engine[1149]: I0515 09:26:11.713891 1149 omaha_request_action.cc:270] Posting an Omaha request to disabled May 15 09:26:11.714122 update_engine[1149]: I0515 09:26:11.713940 1149 omaha_request_action.cc:271] Request: May 15 09:26:11.714122 update_engine[1149]: May 15 09:26:11.714122 update_engine[1149]: May 15 09:26:11.714122 update_engine[1149]: May 15 09:26:11.714122 update_engine[1149]: May 15 09:26:11.714122 update_engine[1149]: May 15 09:26:11.714122 update_engine[1149]: May 15 09:26:11.714122 update_engine[1149]: May 15 09:26:11.714122 update_engine[1149]: May 15 09:26:11.714122 update_engine[1149]: I0515 09:26:11.713953 1149 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 15 09:26:11.728090 update_engine[1149]: I0515 09:26:11.728027 1149 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 15 09:26:11.728472 update_engine[1149]: E0515 09:26:11.728430 1149 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 15 09:26:11.728983 update_engine[1149]: I0515 09:26:11.728686 1149 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 May 15 09:26:11.732277 locksmithd[1195]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 May 15 09:26:20.913760 systemd[1]: run-containerd-runc-k8s.io-a971b5e40d66e250b96d4cd763b06b9a123d362b996aebd9957752bb747b6281-runc.OKnUXB.mount: Deactivated successfully. May 15 09:26:21.640644 update_engine[1149]: I0515 09:26:21.638794 1149 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 15 09:26:21.640644 update_engine[1149]: I0515 09:26:21.639971 1149 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 15 09:26:21.642733 update_engine[1149]: E0515 09:26:21.642432 1149 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 15 09:26:21.642733 update_engine[1149]: I0515 09:26:21.642678 1149 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 May 15 09:26:31.642647 update_engine[1149]: I0515 09:26:31.640414 1149 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 15 09:26:31.642647 update_engine[1149]: I0515 09:26:31.641790 1149 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 15 09:26:31.642647 update_engine[1149]: E0515 09:26:31.642287 1149 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 15 09:26:31.645518 update_engine[1149]: I0515 09:26:31.645329 1149 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 May 15 09:26:41.641593 update_engine[1149]: I0515 09:26:41.639029 1149 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 15 09:26:41.641593 update_engine[1149]: I0515 09:26:41.639964 1149 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 15 09:26:41.641593 update_engine[1149]: E0515 09:26:41.640182 1149 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 15 09:26:41.641593 update_engine[1149]: I0515 09:26:41.640395 1149 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded May 15 09:26:41.641593 update_engine[1149]: I0515 09:26:41.640429 1149 omaha_request_action.cc:621] Omaha request response: May 15 09:26:41.641593 update_engine[1149]: E0515 09:26:41.641044 1149 omaha_request_action.cc:640] Omaha request network transfer failed. May 15 09:26:41.641593 update_engine[1149]: I0515 09:26:41.641167 1149 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. May 15 09:26:41.641593 update_engine[1149]: I0515 09:26:41.641176 1149 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 15 09:26:41.641593 update_engine[1149]: I0515 09:26:41.641184 1149 update_attempter.cc:306] Processing Done. May 15 09:26:41.641593 update_engine[1149]: E0515 09:26:41.641281 1149 update_attempter.cc:619] Update failed. May 15 09:26:41.641593 update_engine[1149]: I0515 09:26:41.641305 1149 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse May 15 09:26:41.641593 update_engine[1149]: I0515 09:26:41.641314 1149 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) May 15 09:26:41.641593 update_engine[1149]: I0515 09:26:41.641330 1149 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. May 15 09:26:41.645726 update_engine[1149]: I0515 09:26:41.645463 1149 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction May 15 09:26:41.647286 update_engine[1149]: I0515 09:26:41.645994 1149 omaha_request_action.cc:270] Posting an Omaha request to disabled May 15 09:26:41.647286 update_engine[1149]: I0515 09:26:41.646023 1149 omaha_request_action.cc:271] Request: May 15 09:26:41.647286 update_engine[1149]: May 15 09:26:41.647286 update_engine[1149]: May 15 09:26:41.647286 update_engine[1149]: May 15 09:26:41.647286 update_engine[1149]: May 15 09:26:41.647286 update_engine[1149]: May 15 09:26:41.647286 update_engine[1149]: May 15 09:26:41.647286 update_engine[1149]: I0515 09:26:41.646034 1149 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 15 09:26:41.647286 update_engine[1149]: I0515 09:26:41.646406 1149 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 15 09:26:41.647286 update_engine[1149]: E0515 09:26:41.646649 1149 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 15 09:26:41.647286 update_engine[1149]: I0515 09:26:41.646786 1149 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded May 15 09:26:41.647286 update_engine[1149]: I0515 09:26:41.646801 1149 omaha_request_action.cc:621] Omaha request response: May 15 09:26:41.647286 update_engine[1149]: I0515 09:26:41.646811 1149 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 15 09:26:41.647286 update_engine[1149]: I0515 09:26:41.646819 1149 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 15 09:26:41.647286 update_engine[1149]: I0515 09:26:41.646827 1149 update_attempter.cc:306] Processing Done. May 15 09:26:41.647286 update_engine[1149]: I0515 09:26:41.646835 1149 update_attempter.cc:310] Error event sent. May 15 09:26:41.647286 update_engine[1149]: I0515 09:26:41.646880 1149 update_check_scheduler.cc:74] Next update check in 40m19s May 15 09:26:41.653372 locksmithd[1195]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 May 15 09:26:41.654747 locksmithd[1195]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 May 15 09:26:43.825000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:26:43.841719 kernel: audit: type=1400 audit(1747301203.825:1598): avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:26:43.842214 kernel: audit: type=1300 audit(1747301203.825:1598): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ad0a00 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:26:43.825000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ad0a00 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:26:43.825000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:26:43.875785 kernel: audit: type=1327 audit(1747301203.825:1598): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:26:43.875968 kernel: audit: type=1400 audit(1747301203.840:1599): avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:26:43.840000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:26:43.890088 kernel: audit: type=1300 audit(1747301203.840:1599): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000bb5500 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:26:43.840000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000bb5500 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:26:43.911870 kernel: audit: type=1327 audit(1747301203.840:1599): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:26:43.840000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:26:44.557000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:26:44.557000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00565f860 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:26:44.602056 kernel: audit: type=1400 audit(1747301204.557:1600): avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:26:44.602373 kernel: audit: type=1300 audit(1747301204.557:1600): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00565f860 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:26:44.557000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:26:44.622604 kernel: audit: type=1327 audit(1747301204.557:1600): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:26:44.620000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:26:44.642839 kernel: audit: type=1400 audit(1747301204.620:1601): avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:26:44.620000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c006dd9260 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:26:44.620000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:26:44.620000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:26:44.620000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0076660e0 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:26:44.620000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:26:44.621000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:26:44.621000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c007666100 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:26:44.621000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:26:44.622000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:26:44.622000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00565f8c0 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:26:44.622000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:26:44.622000 audit[1795]: AVC avc: denied { watch } for pid=1795 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:26:44.622000 audit[1795]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c006dd9500 a2=fc6 a3=0 items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c202,c279 key=(null) May 15 09:26:44.622000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 15 09:26:47.156000 audit[4052]: AVC avc: denied { watch } for pid=4052 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_09_20_20.3686309504/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c808,c879 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c808,c879 tclass=file permissive=0 May 15 09:26:47.156000 audit[4052]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00190c300 a2=fc6 a3=0 items=0 ppid=3296 pid=4052 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c808,c879 key=(null) May 15 09:26:47.156000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 09:26:48.521000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:26:48.521000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:26:48.521000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ad1700 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:26:48.521000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b24760 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:26:48.521000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:26:48.521000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:26:48.523000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:26:48.523000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ad1900 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:26:48.523000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:26:48.525000 audit[1829]: AVC avc: denied { watch } for pid=1829 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 09:26:48.525000 audit[1829]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ad1cc0 a2=fc6 a3=0 items=0 ppid=1675 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c126,c173 key=(null) May 15 09:26:48.525000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 09:26:53.419722 kernel: kauditd_printk_skb: 29 callbacks suppressed May 15 09:26:53.420114 kernel: audit: type=1400 audit(1747301213.409:1611): avc: denied { watch } for pid=4468 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_09_20_20.1273244570/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c673 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c214,c673 tclass=file permissive=0 May 15 09:26:53.409000 audit[4468]: AVC avc: denied { watch } for pid=4468 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_09_20_20.1273244570/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c214,c673 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c214,c673 tclass=file permissive=0 May 15 09:26:53.409000 audit[4468]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0013bd0c0 a2=fc6 a3=0 items=0 ppid=3720 pid=4468 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c673 key=(null) May 15 09:26:53.450868 kernel: audit: type=1300 audit(1747301213.409:1611): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0013bd0c0 a2=fc6 a3=0 items=0 ppid=3720 pid=4468 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c214,c673 key=(null) May 15 09:26:53.409000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 09:26:53.469644 kernel: audit: type=1327 audit(1747301213.409:1611): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 09:27:04.814150 systemd[1]: run-containerd-runc-k8s.io-1baed0fd5b8d0f5e87561ba7eefc4e63950f1175bfd80637fdcbe4853b78964c-runc.Q9AvOv.mount: Deactivated successfully.