Jul 10 00:55:43.644172 kernel: Linux version 5.15.186-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Wed Jul 9 23:09:45 -00 2025 Jul 10 00:55:43.644187 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=6cddad5f675165861f6062277cc28875548c735477e689762fc73abc16b63a3d Jul 10 00:55:43.644194 kernel: Disabled fast string operations Jul 10 00:55:43.644198 kernel: BIOS-provided physical RAM map: Jul 10 00:55:43.644202 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Jul 10 00:55:43.644206 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Jul 10 00:55:43.644212 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Jul 10 00:55:43.644216 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Jul 10 00:55:43.644220 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Jul 10 00:55:43.644224 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Jul 10 00:55:43.644228 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Jul 10 00:55:43.644232 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Jul 10 00:55:43.644237 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Jul 10 00:55:43.644241 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Jul 10 00:55:43.644247 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Jul 10 00:55:43.644252 kernel: NX (Execute Disable) protection: active Jul 10 00:55:43.644256 kernel: SMBIOS 2.7 present. Jul 10 00:55:43.644261 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Jul 10 00:55:43.644266 kernel: vmware: hypercall mode: 0x00 Jul 10 00:55:43.644270 kernel: Hypervisor detected: VMware Jul 10 00:55:43.644276 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Jul 10 00:55:43.644280 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Jul 10 00:55:43.644285 kernel: vmware: using clock offset of 2684089691 ns Jul 10 00:55:43.644289 kernel: tsc: Detected 3408.000 MHz processor Jul 10 00:55:43.644294 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 10 00:55:43.644299 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 10 00:55:43.644304 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Jul 10 00:55:43.644308 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 10 00:55:43.644313 kernel: total RAM covered: 3072M Jul 10 00:55:43.644319 kernel: Found optimal setting for mtrr clean up Jul 10 00:55:43.644324 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Jul 10 00:55:43.644329 kernel: Using GB pages for direct mapping Jul 10 00:55:43.644333 kernel: ACPI: Early table checksum verification disabled Jul 10 00:55:43.644338 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Jul 10 00:55:43.644342 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Jul 10 00:55:43.644347 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Jul 10 00:55:43.644352 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Jul 10 00:55:43.644356 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Jul 10 00:55:43.644361 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Jul 10 00:55:43.644367 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Jul 10 00:55:43.644373 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Jul 10 00:55:43.644378 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Jul 10 00:55:43.644383 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Jul 10 00:55:43.644389 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Jul 10 00:55:43.644395 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Jul 10 00:55:43.644400 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Jul 10 00:55:43.644405 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Jul 10 00:55:43.644410 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Jul 10 00:55:43.644415 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Jul 10 00:55:43.644420 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Jul 10 00:55:43.644425 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Jul 10 00:55:43.644430 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Jul 10 00:55:43.644435 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Jul 10 00:55:43.644441 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Jul 10 00:55:43.644446 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Jul 10 00:55:43.644451 kernel: system APIC only can use physical flat Jul 10 00:55:43.644456 kernel: Setting APIC routing to physical flat. Jul 10 00:55:43.644461 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Jul 10 00:55:43.644466 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Jul 10 00:55:43.644471 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Jul 10 00:55:43.644476 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Jul 10 00:55:43.644481 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Jul 10 00:55:43.644487 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Jul 10 00:55:43.644492 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Jul 10 00:55:43.644497 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Jul 10 00:55:43.644502 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Jul 10 00:55:43.644507 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Jul 10 00:55:43.644512 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Jul 10 00:55:43.644517 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Jul 10 00:55:43.644522 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Jul 10 00:55:43.644526 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Jul 10 00:55:43.644532 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Jul 10 00:55:43.644537 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Jul 10 00:55:43.644542 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Jul 10 00:55:43.644547 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Jul 10 00:55:43.644552 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Jul 10 00:55:43.644557 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Jul 10 00:55:43.644562 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Jul 10 00:55:43.644567 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Jul 10 00:55:43.644572 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Jul 10 00:55:43.644577 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Jul 10 00:55:43.644582 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Jul 10 00:55:43.644587 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Jul 10 00:55:43.644592 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Jul 10 00:55:43.647454 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Jul 10 00:55:43.647461 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Jul 10 00:55:43.647467 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Jul 10 00:55:43.647472 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Jul 10 00:55:43.647477 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Jul 10 00:55:43.647482 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Jul 10 00:55:43.647487 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Jul 10 00:55:43.647492 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Jul 10 00:55:43.647500 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Jul 10 00:55:43.647505 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Jul 10 00:55:43.647510 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Jul 10 00:55:43.647515 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Jul 10 00:55:43.647520 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Jul 10 00:55:43.647525 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Jul 10 00:55:43.647530 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Jul 10 00:55:43.647535 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Jul 10 00:55:43.647540 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Jul 10 00:55:43.647545 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Jul 10 00:55:43.647551 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Jul 10 00:55:43.647556 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Jul 10 00:55:43.647561 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Jul 10 00:55:43.647566 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Jul 10 00:55:43.647571 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Jul 10 00:55:43.647576 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Jul 10 00:55:43.647581 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Jul 10 00:55:43.647586 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Jul 10 00:55:43.647591 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Jul 10 00:55:43.647597 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Jul 10 00:55:43.647602 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Jul 10 00:55:43.647608 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Jul 10 00:55:43.647612 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Jul 10 00:55:43.647618 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Jul 10 00:55:43.647623 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Jul 10 00:55:43.647629 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Jul 10 00:55:43.647636 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Jul 10 00:55:43.647643 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Jul 10 00:55:43.647648 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Jul 10 00:55:43.647653 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Jul 10 00:55:43.647660 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Jul 10 00:55:43.647665 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Jul 10 00:55:43.647671 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Jul 10 00:55:43.647676 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Jul 10 00:55:43.647681 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Jul 10 00:55:43.647687 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Jul 10 00:55:43.647692 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Jul 10 00:55:43.647697 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Jul 10 00:55:43.647704 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Jul 10 00:55:43.647709 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Jul 10 00:55:43.647714 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Jul 10 00:55:43.647720 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Jul 10 00:55:43.647725 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Jul 10 00:55:43.647767 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Jul 10 00:55:43.647774 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Jul 10 00:55:43.647780 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Jul 10 00:55:43.647785 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Jul 10 00:55:43.647791 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Jul 10 00:55:43.647799 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Jul 10 00:55:43.647804 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Jul 10 00:55:43.647810 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Jul 10 00:55:43.647815 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Jul 10 00:55:43.647820 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Jul 10 00:55:43.647826 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Jul 10 00:55:43.647831 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Jul 10 00:55:43.647837 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Jul 10 00:55:43.647842 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Jul 10 00:55:43.647848 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Jul 10 00:55:43.647854 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Jul 10 00:55:43.647859 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Jul 10 00:55:43.647864 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Jul 10 00:55:43.647870 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Jul 10 00:55:43.647875 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Jul 10 00:55:43.647881 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Jul 10 00:55:43.647886 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Jul 10 00:55:43.647891 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Jul 10 00:55:43.647896 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Jul 10 00:55:43.647903 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Jul 10 00:55:43.647908 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Jul 10 00:55:43.647913 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Jul 10 00:55:43.647919 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Jul 10 00:55:43.647924 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Jul 10 00:55:43.647930 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Jul 10 00:55:43.647935 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Jul 10 00:55:43.647940 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Jul 10 00:55:43.647946 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Jul 10 00:55:43.647951 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Jul 10 00:55:43.647958 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Jul 10 00:55:43.647963 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Jul 10 00:55:43.647968 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Jul 10 00:55:43.647974 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Jul 10 00:55:43.647979 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Jul 10 00:55:43.647984 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Jul 10 00:55:43.647990 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Jul 10 00:55:43.647995 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Jul 10 00:55:43.648000 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Jul 10 00:55:43.648006 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Jul 10 00:55:43.648012 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Jul 10 00:55:43.648017 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Jul 10 00:55:43.648023 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Jul 10 00:55:43.648028 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Jul 10 00:55:43.648033 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Jul 10 00:55:43.648039 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Jul 10 00:55:43.648044 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Jul 10 00:55:43.648050 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Jul 10 00:55:43.648056 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Jul 10 00:55:43.648063 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Jul 10 00:55:43.648068 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Jul 10 00:55:43.648074 kernel: Zone ranges: Jul 10 00:55:43.648080 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 10 00:55:43.648086 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Jul 10 00:55:43.648091 kernel: Normal empty Jul 10 00:55:43.648097 kernel: Movable zone start for each node Jul 10 00:55:43.648103 kernel: Early memory node ranges Jul 10 00:55:43.648108 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Jul 10 00:55:43.648113 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Jul 10 00:55:43.648120 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Jul 10 00:55:43.648125 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Jul 10 00:55:43.648131 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 10 00:55:43.648136 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Jul 10 00:55:43.648142 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Jul 10 00:55:43.648147 kernel: ACPI: PM-Timer IO Port: 0x1008 Jul 10 00:55:43.648153 kernel: system APIC only can use physical flat Jul 10 00:55:43.648158 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Jul 10 00:55:43.648164 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Jul 10 00:55:43.648170 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Jul 10 00:55:43.648176 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Jul 10 00:55:43.648181 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Jul 10 00:55:43.648187 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Jul 10 00:55:43.648192 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Jul 10 00:55:43.648198 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Jul 10 00:55:43.648204 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Jul 10 00:55:43.648209 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Jul 10 00:55:43.648214 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Jul 10 00:55:43.648220 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Jul 10 00:55:43.648226 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Jul 10 00:55:43.648231 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Jul 10 00:55:43.648237 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Jul 10 00:55:43.648242 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Jul 10 00:55:43.648248 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Jul 10 00:55:43.648253 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Jul 10 00:55:43.648258 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Jul 10 00:55:43.648264 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Jul 10 00:55:43.648269 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Jul 10 00:55:43.648275 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Jul 10 00:55:43.648281 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Jul 10 00:55:43.648286 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Jul 10 00:55:43.648291 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Jul 10 00:55:43.648297 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Jul 10 00:55:43.648302 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Jul 10 00:55:43.648307 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Jul 10 00:55:43.648313 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Jul 10 00:55:43.648318 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Jul 10 00:55:43.648323 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Jul 10 00:55:43.648330 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Jul 10 00:55:43.648335 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Jul 10 00:55:43.648341 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Jul 10 00:55:43.648346 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Jul 10 00:55:43.648351 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Jul 10 00:55:43.648357 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Jul 10 00:55:43.648362 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Jul 10 00:55:43.648367 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Jul 10 00:55:43.648373 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Jul 10 00:55:43.648379 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Jul 10 00:55:43.648384 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Jul 10 00:55:43.648390 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Jul 10 00:55:43.648395 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Jul 10 00:55:43.648401 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Jul 10 00:55:43.648406 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Jul 10 00:55:43.648411 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Jul 10 00:55:43.648417 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Jul 10 00:55:43.648422 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Jul 10 00:55:43.648429 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Jul 10 00:55:43.648434 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Jul 10 00:55:43.648439 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Jul 10 00:55:43.648445 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Jul 10 00:55:43.648451 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Jul 10 00:55:43.648456 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Jul 10 00:55:43.648461 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Jul 10 00:55:43.648467 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Jul 10 00:55:43.648472 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Jul 10 00:55:43.648478 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Jul 10 00:55:43.648484 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Jul 10 00:55:43.648489 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Jul 10 00:55:43.648495 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Jul 10 00:55:43.648500 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Jul 10 00:55:43.648506 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Jul 10 00:55:43.648511 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Jul 10 00:55:43.648516 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Jul 10 00:55:43.648522 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Jul 10 00:55:43.648527 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Jul 10 00:55:43.648533 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Jul 10 00:55:43.648539 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Jul 10 00:55:43.648544 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Jul 10 00:55:43.648549 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Jul 10 00:55:43.648555 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Jul 10 00:55:43.648560 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Jul 10 00:55:43.648566 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Jul 10 00:55:43.648571 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Jul 10 00:55:43.648577 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Jul 10 00:55:43.648582 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Jul 10 00:55:43.648588 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Jul 10 00:55:43.648594 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Jul 10 00:55:43.648600 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Jul 10 00:55:43.648605 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Jul 10 00:55:43.648611 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Jul 10 00:55:43.648616 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Jul 10 00:55:43.648621 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Jul 10 00:55:43.648627 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Jul 10 00:55:43.648632 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Jul 10 00:55:43.648639 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Jul 10 00:55:43.648644 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Jul 10 00:55:43.648649 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Jul 10 00:55:43.648655 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Jul 10 00:55:43.648660 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Jul 10 00:55:43.648665 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Jul 10 00:55:43.648671 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Jul 10 00:55:43.648677 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Jul 10 00:55:43.648682 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Jul 10 00:55:43.648688 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Jul 10 00:55:43.648694 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Jul 10 00:55:43.648703 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Jul 10 00:55:43.648709 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Jul 10 00:55:43.648714 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Jul 10 00:55:43.648719 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Jul 10 00:55:43.648725 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Jul 10 00:55:43.648736 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Jul 10 00:55:43.648742 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Jul 10 00:55:43.648747 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Jul 10 00:55:43.648754 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Jul 10 00:55:43.648759 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Jul 10 00:55:43.648764 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Jul 10 00:55:43.648770 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Jul 10 00:55:43.648775 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Jul 10 00:55:43.648781 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Jul 10 00:55:43.648786 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Jul 10 00:55:43.648791 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Jul 10 00:55:43.648797 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Jul 10 00:55:43.648802 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Jul 10 00:55:43.648809 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Jul 10 00:55:43.648814 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Jul 10 00:55:43.648819 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Jul 10 00:55:43.648825 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Jul 10 00:55:43.648830 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Jul 10 00:55:43.648836 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Jul 10 00:55:43.648841 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Jul 10 00:55:43.648846 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Jul 10 00:55:43.648852 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Jul 10 00:55:43.648858 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Jul 10 00:55:43.648864 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Jul 10 00:55:43.648869 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Jul 10 00:55:43.648874 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Jul 10 00:55:43.648880 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Jul 10 00:55:43.648885 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 10 00:55:43.648891 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Jul 10 00:55:43.648896 kernel: TSC deadline timer available Jul 10 00:55:43.648902 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Jul 10 00:55:43.648908 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Jul 10 00:55:43.648914 kernel: Booting paravirtualized kernel on VMware hypervisor Jul 10 00:55:43.648919 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 10 00:55:43.648925 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Jul 10 00:55:43.648930 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Jul 10 00:55:43.648936 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Jul 10 00:55:43.648941 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Jul 10 00:55:43.648946 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Jul 10 00:55:43.648952 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Jul 10 00:55:43.648958 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Jul 10 00:55:43.648964 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Jul 10 00:55:43.648969 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Jul 10 00:55:43.648974 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Jul 10 00:55:43.648987 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Jul 10 00:55:43.648993 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Jul 10 00:55:43.648999 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Jul 10 00:55:43.649005 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Jul 10 00:55:43.649012 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Jul 10 00:55:43.649018 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Jul 10 00:55:43.649024 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Jul 10 00:55:43.649029 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Jul 10 00:55:43.649035 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Jul 10 00:55:43.649041 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Jul 10 00:55:43.649046 kernel: Policy zone: DMA32 Jul 10 00:55:43.649053 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=6cddad5f675165861f6062277cc28875548c735477e689762fc73abc16b63a3d Jul 10 00:55:43.649060 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 10 00:55:43.649067 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Jul 10 00:55:43.649073 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Jul 10 00:55:43.649079 kernel: printk: log_buf_len min size: 262144 bytes Jul 10 00:55:43.649085 kernel: printk: log_buf_len: 1048576 bytes Jul 10 00:55:43.649090 kernel: printk: early log buf free: 239728(91%) Jul 10 00:55:43.649096 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 10 00:55:43.649102 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jul 10 00:55:43.649108 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 10 00:55:43.649114 kernel: Memory: 1940392K/2096628K available (12295K kernel code, 2275K rwdata, 13724K rodata, 47472K init, 4108K bss, 155976K reserved, 0K cma-reserved) Jul 10 00:55:43.649121 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Jul 10 00:55:43.649127 kernel: ftrace: allocating 34602 entries in 136 pages Jul 10 00:55:43.649133 kernel: ftrace: allocated 136 pages with 2 groups Jul 10 00:55:43.649140 kernel: rcu: Hierarchical RCU implementation. Jul 10 00:55:43.649146 kernel: rcu: RCU event tracing is enabled. Jul 10 00:55:43.649153 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Jul 10 00:55:43.649159 kernel: Rude variant of Tasks RCU enabled. Jul 10 00:55:43.649165 kernel: Tracing variant of Tasks RCU enabled. Jul 10 00:55:43.649171 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 10 00:55:43.649176 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Jul 10 00:55:43.649182 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Jul 10 00:55:43.649188 kernel: random: crng init done Jul 10 00:55:43.649194 kernel: Console: colour VGA+ 80x25 Jul 10 00:55:43.649200 kernel: printk: console [tty0] enabled Jul 10 00:55:43.649206 kernel: printk: console [ttyS0] enabled Jul 10 00:55:43.649213 kernel: ACPI: Core revision 20210730 Jul 10 00:55:43.649219 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Jul 10 00:55:43.649225 kernel: APIC: Switch to symmetric I/O mode setup Jul 10 00:55:43.649230 kernel: x2apic enabled Jul 10 00:55:43.649236 kernel: Switched APIC routing to physical x2apic. Jul 10 00:55:43.649242 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Jul 10 00:55:43.649249 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Jul 10 00:55:43.649255 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Jul 10 00:55:43.649261 kernel: Disabled fast string operations Jul 10 00:55:43.649268 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Jul 10 00:55:43.649274 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 Jul 10 00:55:43.649280 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 10 00:55:43.649286 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Jul 10 00:55:43.649292 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Jul 10 00:55:43.649298 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Jul 10 00:55:43.649304 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Jul 10 00:55:43.649309 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Jul 10 00:55:43.649316 kernel: RETBleed: Mitigation: Enhanced IBRS Jul 10 00:55:43.649322 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jul 10 00:55:43.649328 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Jul 10 00:55:43.649334 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Jul 10 00:55:43.649340 kernel: SRBDS: Unknown: Dependent on hypervisor status Jul 10 00:55:43.649346 kernel: GDS: Unknown: Dependent on hypervisor status Jul 10 00:55:43.649352 kernel: ITS: Mitigation: Aligned branch/return thunks Jul 10 00:55:43.649358 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 10 00:55:43.649364 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 10 00:55:43.649371 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 10 00:55:43.649377 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 10 00:55:43.649383 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Jul 10 00:55:43.649389 kernel: Freeing SMP alternatives memory: 32K Jul 10 00:55:43.649395 kernel: pid_max: default: 131072 minimum: 1024 Jul 10 00:55:43.649401 kernel: LSM: Security Framework initializing Jul 10 00:55:43.649406 kernel: SELinux: Initializing. Jul 10 00:55:43.649412 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jul 10 00:55:43.649419 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jul 10 00:55:43.649426 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Jul 10 00:55:43.649432 kernel: Performance Events: Skylake events, core PMU driver. Jul 10 00:55:43.649438 kernel: core: CPUID marked event: 'cpu cycles' unavailable Jul 10 00:55:43.649444 kernel: core: CPUID marked event: 'instructions' unavailable Jul 10 00:55:43.649450 kernel: core: CPUID marked event: 'bus cycles' unavailable Jul 10 00:55:43.649456 kernel: core: CPUID marked event: 'cache references' unavailable Jul 10 00:55:43.649461 kernel: core: CPUID marked event: 'cache misses' unavailable Jul 10 00:55:43.649467 kernel: core: CPUID marked event: 'branch instructions' unavailable Jul 10 00:55:43.649473 kernel: core: CPUID marked event: 'branch misses' unavailable Jul 10 00:55:43.649480 kernel: ... version: 1 Jul 10 00:55:43.649485 kernel: ... bit width: 48 Jul 10 00:55:43.649491 kernel: ... generic registers: 4 Jul 10 00:55:43.649497 kernel: ... value mask: 0000ffffffffffff Jul 10 00:55:43.649503 kernel: ... max period: 000000007fffffff Jul 10 00:55:43.649509 kernel: ... fixed-purpose events: 0 Jul 10 00:55:43.649515 kernel: ... event mask: 000000000000000f Jul 10 00:55:43.649520 kernel: signal: max sigframe size: 1776 Jul 10 00:55:43.649526 kernel: rcu: Hierarchical SRCU implementation. Jul 10 00:55:43.649533 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Jul 10 00:55:43.649539 kernel: smp: Bringing up secondary CPUs ... Jul 10 00:55:43.649545 kernel: x86: Booting SMP configuration: Jul 10 00:55:43.649551 kernel: .... node #0, CPUs: #1 Jul 10 00:55:43.649625 kernel: Disabled fast string operations Jul 10 00:55:43.649637 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Jul 10 00:55:43.649644 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Jul 10 00:55:43.649650 kernel: smp: Brought up 1 node, 2 CPUs Jul 10 00:55:43.649656 kernel: smpboot: Max logical packages: 128 Jul 10 00:55:43.649662 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Jul 10 00:55:43.649670 kernel: devtmpfs: initialized Jul 10 00:55:43.649676 kernel: x86/mm: Memory block size: 128MB Jul 10 00:55:43.649682 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Jul 10 00:55:43.649688 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 10 00:55:43.649693 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Jul 10 00:55:43.649717 kernel: pinctrl core: initialized pinctrl subsystem Jul 10 00:55:43.649724 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 10 00:55:43.649736 kernel: audit: initializing netlink subsys (disabled) Jul 10 00:55:43.649742 kernel: audit: type=2000 audit(1752108942.084:1): state=initialized audit_enabled=0 res=1 Jul 10 00:55:43.649751 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 10 00:55:43.649757 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 10 00:55:43.649763 kernel: cpuidle: using governor menu Jul 10 00:55:43.649768 kernel: Simple Boot Flag at 0x36 set to 0x80 Jul 10 00:55:43.649774 kernel: ACPI: bus type PCI registered Jul 10 00:55:43.649780 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 10 00:55:43.649786 kernel: dca service started, version 1.12.1 Jul 10 00:55:43.649792 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Jul 10 00:55:43.649798 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Jul 10 00:55:43.649805 kernel: PCI: Using configuration type 1 for base access Jul 10 00:55:43.649811 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 10 00:55:43.649817 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 10 00:55:43.649822 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 10 00:55:43.649828 kernel: ACPI: Added _OSI(Module Device) Jul 10 00:55:43.649834 kernel: ACPI: Added _OSI(Processor Device) Jul 10 00:55:43.649840 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 10 00:55:43.649846 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 10 00:55:43.649851 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 10 00:55:43.649858 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 10 00:55:43.649865 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 10 00:55:43.649870 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Jul 10 00:55:43.649877 kernel: ACPI: Interpreter enabled Jul 10 00:55:43.649883 kernel: ACPI: PM: (supports S0 S1 S5) Jul 10 00:55:43.649889 kernel: ACPI: Using IOAPIC for interrupt routing Jul 10 00:55:43.649895 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 10 00:55:43.649901 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Jul 10 00:55:43.649907 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Jul 10 00:55:43.649984 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 10 00:55:43.650037 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Jul 10 00:55:43.650101 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Jul 10 00:55:43.650110 kernel: PCI host bridge to bus 0000:00 Jul 10 00:55:43.650158 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 10 00:55:43.650201 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000dbfff window] Jul 10 00:55:43.650246 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Jul 10 00:55:43.650286 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 10 00:55:43.650327 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Jul 10 00:55:43.650368 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Jul 10 00:55:43.650423 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Jul 10 00:55:43.650476 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Jul 10 00:55:43.650531 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Jul 10 00:55:43.650585 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Jul 10 00:55:43.650632 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Jul 10 00:55:43.650680 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Jul 10 00:55:43.650727 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Jul 10 00:55:43.653818 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Jul 10 00:55:43.653873 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Jul 10 00:55:43.653932 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Jul 10 00:55:43.653982 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Jul 10 00:55:43.654030 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Jul 10 00:55:43.654083 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Jul 10 00:55:43.654132 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Jul 10 00:55:43.654180 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Jul 10 00:55:43.654234 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Jul 10 00:55:43.654283 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Jul 10 00:55:43.654331 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Jul 10 00:55:43.654378 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Jul 10 00:55:43.654425 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Jul 10 00:55:43.654473 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jul 10 00:55:43.654524 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Jul 10 00:55:43.654579 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.654628 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.654681 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.654739 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.654795 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.654845 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.654901 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.654951 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.655004 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.655052 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.655105 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.658817 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.658898 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.658953 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.659007 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.659056 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.659108 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.659156 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.659209 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.659256 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.659308 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.659356 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.659407 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.659455 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.659510 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.659557 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.659607 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.659656 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.662140 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.662195 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.662250 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.662300 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.662352 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.662401 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.662453 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.662503 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.662557 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.662606 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.662657 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.662710 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.662780 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.662830 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.662883 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.662949 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.663019 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.663091 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.663168 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.663237 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.663314 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.663404 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.663477 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.663543 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.663600 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.663648 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.663699 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.663778 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.663833 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.663881 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.663933 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.663980 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.664032 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.664082 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.664133 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Jul 10 00:55:43.664181 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.664231 kernel: pci_bus 0000:01: extended config space not accessible Jul 10 00:55:43.664280 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Jul 10 00:55:43.664329 kernel: pci_bus 0000:02: extended config space not accessible Jul 10 00:55:43.664338 kernel: acpiphp: Slot [32] registered Jul 10 00:55:43.664346 kernel: acpiphp: Slot [33] registered Jul 10 00:55:43.664352 kernel: acpiphp: Slot [34] registered Jul 10 00:55:43.664358 kernel: acpiphp: Slot [35] registered Jul 10 00:55:43.664363 kernel: acpiphp: Slot [36] registered Jul 10 00:55:43.664369 kernel: acpiphp: Slot [37] registered Jul 10 00:55:43.664375 kernel: acpiphp: Slot [38] registered Jul 10 00:55:43.664380 kernel: acpiphp: Slot [39] registered Jul 10 00:55:43.664386 kernel: acpiphp: Slot [40] registered Jul 10 00:55:43.664392 kernel: acpiphp: Slot [41] registered Jul 10 00:55:43.664399 kernel: acpiphp: Slot [42] registered Jul 10 00:55:43.664404 kernel: acpiphp: Slot [43] registered Jul 10 00:55:43.664410 kernel: acpiphp: Slot [44] registered Jul 10 00:55:43.664416 kernel: acpiphp: Slot [45] registered Jul 10 00:55:43.664421 kernel: acpiphp: Slot [46] registered Jul 10 00:55:43.664427 kernel: acpiphp: Slot [47] registered Jul 10 00:55:43.664433 kernel: acpiphp: Slot [48] registered Jul 10 00:55:43.664439 kernel: acpiphp: Slot [49] registered Jul 10 00:55:43.664445 kernel: acpiphp: Slot [50] registered Jul 10 00:55:43.664450 kernel: acpiphp: Slot [51] registered Jul 10 00:55:43.664457 kernel: acpiphp: Slot [52] registered Jul 10 00:55:43.664463 kernel: acpiphp: Slot [53] registered Jul 10 00:55:43.664469 kernel: acpiphp: Slot [54] registered Jul 10 00:55:43.664474 kernel: acpiphp: Slot [55] registered Jul 10 00:55:43.664480 kernel: acpiphp: Slot [56] registered Jul 10 00:55:43.664486 kernel: acpiphp: Slot [57] registered Jul 10 00:55:43.664491 kernel: acpiphp: Slot [58] registered Jul 10 00:55:43.664497 kernel: acpiphp: Slot [59] registered Jul 10 00:55:43.664503 kernel: acpiphp: Slot [60] registered Jul 10 00:55:43.664509 kernel: acpiphp: Slot [61] registered Jul 10 00:55:43.664515 kernel: acpiphp: Slot [62] registered Jul 10 00:55:43.664521 kernel: acpiphp: Slot [63] registered Jul 10 00:55:43.664568 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Jul 10 00:55:43.664617 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Jul 10 00:55:43.664664 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Jul 10 00:55:43.664716 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Jul 10 00:55:43.665805 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Jul 10 00:55:43.665864 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000dbfff window] (subtractive decode) Jul 10 00:55:43.665914 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Jul 10 00:55:43.665963 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Jul 10 00:55:43.666010 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Jul 10 00:55:43.666065 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Jul 10 00:55:43.666114 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Jul 10 00:55:43.666163 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Jul 10 00:55:43.666214 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Jul 10 00:55:43.666272 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Jul 10 00:55:43.666322 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Jul 10 00:55:43.666371 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Jul 10 00:55:43.666419 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Jul 10 00:55:43.666466 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Jul 10 00:55:43.666514 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Jul 10 00:55:43.666579 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Jul 10 00:55:43.666630 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Jul 10 00:55:43.666678 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Jul 10 00:55:43.666727 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Jul 10 00:55:43.671829 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Jul 10 00:55:43.671882 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Jul 10 00:55:43.671933 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Jul 10 00:55:43.671984 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Jul 10 00:55:43.672035 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Jul 10 00:55:43.672083 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Jul 10 00:55:43.672133 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Jul 10 00:55:43.672181 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Jul 10 00:55:43.672230 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Jul 10 00:55:43.672281 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Jul 10 00:55:43.672330 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Jul 10 00:55:43.672379 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Jul 10 00:55:43.672428 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Jul 10 00:55:43.672476 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Jul 10 00:55:43.672524 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Jul 10 00:55:43.672574 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Jul 10 00:55:43.672622 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Jul 10 00:55:43.672674 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Jul 10 00:55:43.672741 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Jul 10 00:55:43.672796 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Jul 10 00:55:43.672848 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Jul 10 00:55:43.672898 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Jul 10 00:55:43.672948 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Jul 10 00:55:43.673000 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Jul 10 00:55:43.673080 kernel: pci 0000:0b:00.0: supports D1 D2 Jul 10 00:55:43.673132 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Jul 10 00:55:43.673182 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Jul 10 00:55:43.673231 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Jul 10 00:55:43.673281 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Jul 10 00:55:43.673329 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Jul 10 00:55:43.673378 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Jul 10 00:55:43.673444 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Jul 10 00:55:43.673498 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Jul 10 00:55:43.673546 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Jul 10 00:55:43.673595 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Jul 10 00:55:43.673644 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Jul 10 00:55:43.673692 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Jul 10 00:55:43.673747 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Jul 10 00:55:43.673798 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Jul 10 00:55:43.673849 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Jul 10 00:55:43.673898 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Jul 10 00:55:43.673947 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Jul 10 00:55:43.673995 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Jul 10 00:55:43.674042 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Jul 10 00:55:43.674092 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Jul 10 00:55:43.674140 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Jul 10 00:55:43.674189 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Jul 10 00:55:43.674238 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Jul 10 00:55:43.674289 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Jul 10 00:55:43.674336 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Jul 10 00:55:43.674387 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Jul 10 00:55:43.674434 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Jul 10 00:55:43.674485 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Jul 10 00:55:43.674560 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Jul 10 00:55:43.674621 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Jul 10 00:55:43.674670 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Jul 10 00:55:43.674721 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Jul 10 00:55:43.674784 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Jul 10 00:55:43.674834 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Jul 10 00:55:43.674882 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Jul 10 00:55:43.674931 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Jul 10 00:55:43.674981 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Jul 10 00:55:43.675028 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Jul 10 00:55:43.675080 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Jul 10 00:55:43.675128 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Jul 10 00:55:43.675198 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Jul 10 00:55:43.675250 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Jul 10 00:55:43.675298 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Jul 10 00:55:43.675347 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Jul 10 00:55:43.675396 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Jul 10 00:55:43.675443 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Jul 10 00:55:43.675495 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Jul 10 00:55:43.675543 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Jul 10 00:55:43.675591 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Jul 10 00:55:43.675641 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Jul 10 00:55:43.675689 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Jul 10 00:55:43.683458 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Jul 10 00:55:43.683522 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Jul 10 00:55:43.683574 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Jul 10 00:55:43.683626 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Jul 10 00:55:43.683677 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Jul 10 00:55:43.683726 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Jul 10 00:55:43.683794 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Jul 10 00:55:43.683844 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Jul 10 00:55:43.683895 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Jul 10 00:55:43.683944 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Jul 10 00:55:43.683992 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Jul 10 00:55:43.684043 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Jul 10 00:55:43.684093 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Jul 10 00:55:43.684141 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Jul 10 00:55:43.684188 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Jul 10 00:55:43.684237 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Jul 10 00:55:43.684285 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Jul 10 00:55:43.684334 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Jul 10 00:55:43.684386 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Jul 10 00:55:43.684434 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Jul 10 00:55:43.684482 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Jul 10 00:55:43.684532 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Jul 10 00:55:43.684598 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Jul 10 00:55:43.684651 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Jul 10 00:55:43.684703 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Jul 10 00:55:43.684759 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Jul 10 00:55:43.684814 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Jul 10 00:55:43.684865 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Jul 10 00:55:43.684913 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Jul 10 00:55:43.684961 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Jul 10 00:55:43.684970 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Jul 10 00:55:43.684976 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Jul 10 00:55:43.684982 kernel: ACPI: PCI: Interrupt link LNKB disabled Jul 10 00:55:43.684988 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jul 10 00:55:43.684995 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Jul 10 00:55:43.685002 kernel: iommu: Default domain type: Translated Jul 10 00:55:43.685008 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 10 00:55:43.685057 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Jul 10 00:55:43.685106 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jul 10 00:55:43.685154 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Jul 10 00:55:43.685163 kernel: vgaarb: loaded Jul 10 00:55:43.685169 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 10 00:55:43.685175 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 10 00:55:43.685181 kernel: PTP clock support registered Jul 10 00:55:43.685189 kernel: PCI: Using ACPI for IRQ routing Jul 10 00:55:43.685195 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 10 00:55:43.685201 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Jul 10 00:55:43.685207 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Jul 10 00:55:43.685213 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Jul 10 00:55:43.685219 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Jul 10 00:55:43.685226 kernel: clocksource: Switched to clocksource tsc-early Jul 10 00:55:43.685231 kernel: VFS: Disk quotas dquot_6.6.0 Jul 10 00:55:43.685238 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 10 00:55:43.685245 kernel: pnp: PnP ACPI init Jul 10 00:55:43.685299 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Jul 10 00:55:43.685345 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Jul 10 00:55:43.685389 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Jul 10 00:55:43.685437 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Jul 10 00:55:43.685484 kernel: pnp 00:06: [dma 2] Jul 10 00:55:43.685532 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Jul 10 00:55:43.687944 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Jul 10 00:55:43.687993 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Jul 10 00:55:43.688001 kernel: pnp: PnP ACPI: found 8 devices Jul 10 00:55:43.688008 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 10 00:55:43.688014 kernel: NET: Registered PF_INET protocol family Jul 10 00:55:43.688021 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 10 00:55:43.688027 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Jul 10 00:55:43.688035 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 10 00:55:43.688041 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 10 00:55:43.688047 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Jul 10 00:55:43.688053 kernel: TCP: Hash tables configured (established 16384 bind 16384) Jul 10 00:55:43.688059 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Jul 10 00:55:43.688065 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Jul 10 00:55:43.688071 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 10 00:55:43.688077 kernel: NET: Registered PF_XDP protocol family Jul 10 00:55:43.688129 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Jul 10 00:55:43.688183 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Jul 10 00:55:43.688233 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Jul 10 00:55:43.688282 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Jul 10 00:55:43.688332 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Jul 10 00:55:43.688382 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Jul 10 00:55:43.688432 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Jul 10 00:55:43.688484 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Jul 10 00:55:43.688535 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Jul 10 00:55:43.688585 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Jul 10 00:55:43.688634 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Jul 10 00:55:43.688683 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Jul 10 00:55:43.688744 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Jul 10 00:55:43.688799 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Jul 10 00:55:43.688849 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Jul 10 00:55:43.688899 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Jul 10 00:55:43.688947 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Jul 10 00:55:43.688996 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Jul 10 00:55:43.689046 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Jul 10 00:55:43.689095 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Jul 10 00:55:43.689143 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Jul 10 00:55:43.689192 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Jul 10 00:55:43.689242 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Jul 10 00:55:43.689291 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Jul 10 00:55:43.689342 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Jul 10 00:55:43.689391 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.689438 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.689486 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.689533 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.689582 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.689630 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.689679 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.691797 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.691861 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.691913 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.691963 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.692011 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.692059 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.692107 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.692156 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.692207 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.692256 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.692304 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.692353 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.692400 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.692449 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.692497 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.692544 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.692595 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.692643 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.692690 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.692778 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.692828 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.692875 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.692923 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.692969 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.693020 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.693068 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.693115 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.693163 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.693210 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.693258 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.693305 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.693352 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.693400 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.693450 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.693499 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.693546 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.693593 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.693640 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.693687 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.693740 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.693789 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.693836 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.693887 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.693934 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.693982 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.694030 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.694078 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.694125 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.694173 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.694220 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.694268 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.694317 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.694365 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.694412 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.694460 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.694508 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.694556 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.694604 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.694651 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.694698 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.694752 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.694803 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.694851 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.694898 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.694946 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.694994 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.695041 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.695088 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.695135 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.695184 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.695234 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.695282 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.695329 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.695377 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.695424 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.695470 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Jul 10 00:55:43.695518 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Jul 10 00:55:43.695567 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Jul 10 00:55:43.695616 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Jul 10 00:55:43.695667 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Jul 10 00:55:43.695724 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Jul 10 00:55:43.695780 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Jul 10 00:55:43.695832 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Jul 10 00:55:43.695882 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Jul 10 00:55:43.695930 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Jul 10 00:55:43.695977 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Jul 10 00:55:43.696026 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Jul 10 00:55:43.696077 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Jul 10 00:55:43.696126 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Jul 10 00:55:43.696173 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Jul 10 00:55:43.696221 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Jul 10 00:55:43.696269 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Jul 10 00:55:43.696317 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Jul 10 00:55:43.696364 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Jul 10 00:55:43.696413 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Jul 10 00:55:43.696460 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Jul 10 00:55:43.696509 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Jul 10 00:55:43.696559 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Jul 10 00:55:43.696607 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Jul 10 00:55:43.696654 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Jul 10 00:55:43.696701 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Jul 10 00:55:43.696764 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Jul 10 00:55:43.696814 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Jul 10 00:55:43.696865 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Jul 10 00:55:43.696914 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Jul 10 00:55:43.696962 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Jul 10 00:55:43.697011 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Jul 10 00:55:43.697059 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Jul 10 00:55:43.697107 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Jul 10 00:55:43.697155 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Jul 10 00:55:43.697206 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Jul 10 00:55:43.697256 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Jul 10 00:55:43.697307 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Jul 10 00:55:43.697356 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Jul 10 00:55:43.697404 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Jul 10 00:55:43.697453 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Jul 10 00:55:43.697501 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Jul 10 00:55:43.697550 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Jul 10 00:55:43.697600 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Jul 10 00:55:43.697650 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Jul 10 00:55:43.697698 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Jul 10 00:55:43.697760 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Jul 10 00:55:43.697812 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Jul 10 00:55:43.697860 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Jul 10 00:55:43.697908 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Jul 10 00:55:43.697956 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Jul 10 00:55:43.698006 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Jul 10 00:55:43.698054 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Jul 10 00:55:43.698102 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Jul 10 00:55:43.698151 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Jul 10 00:55:43.698200 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Jul 10 00:55:43.698251 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Jul 10 00:55:43.698299 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Jul 10 00:55:43.698347 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Jul 10 00:55:43.698395 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Jul 10 00:55:43.698443 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Jul 10 00:55:43.698491 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Jul 10 00:55:43.698540 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Jul 10 00:55:43.698589 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Jul 10 00:55:43.698638 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Jul 10 00:55:43.698688 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Jul 10 00:55:43.704912 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Jul 10 00:55:43.704976 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Jul 10 00:55:43.705028 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Jul 10 00:55:43.705078 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Jul 10 00:55:43.705128 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Jul 10 00:55:43.705178 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Jul 10 00:55:43.705226 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Jul 10 00:55:43.705275 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Jul 10 00:55:43.705323 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Jul 10 00:55:43.705375 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Jul 10 00:55:43.705424 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Jul 10 00:55:43.705473 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Jul 10 00:55:43.705522 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Jul 10 00:55:43.705570 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Jul 10 00:55:43.705618 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Jul 10 00:55:43.705667 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Jul 10 00:55:43.705717 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Jul 10 00:55:43.706582 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Jul 10 00:55:43.706644 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Jul 10 00:55:43.706696 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Jul 10 00:55:43.706764 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Jul 10 00:55:43.706818 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Jul 10 00:55:43.706866 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Jul 10 00:55:43.706915 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Jul 10 00:55:43.706965 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Jul 10 00:55:43.707013 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Jul 10 00:55:43.707062 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Jul 10 00:55:43.707111 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Jul 10 00:55:43.707164 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Jul 10 00:55:43.707212 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Jul 10 00:55:43.707261 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Jul 10 00:55:43.707309 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Jul 10 00:55:43.707358 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Jul 10 00:55:43.707405 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Jul 10 00:55:43.707454 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Jul 10 00:55:43.707502 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Jul 10 00:55:43.707551 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Jul 10 00:55:43.707600 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Jul 10 00:55:43.707649 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Jul 10 00:55:43.707701 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Jul 10 00:55:43.708783 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Jul 10 00:55:43.708842 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Jul 10 00:55:43.708894 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Jul 10 00:55:43.708945 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Jul 10 00:55:43.708994 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Jul 10 00:55:43.709042 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Jul 10 00:55:43.709091 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Jul 10 00:55:43.709144 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Jul 10 00:55:43.709192 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Jul 10 00:55:43.709241 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Jul 10 00:55:43.709290 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Jul 10 00:55:43.709334 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000dbfff window] Jul 10 00:55:43.709377 kernel: pci_bus 0000:00: resource 6 [mem 0xc0000000-0xfebfffff window] Jul 10 00:55:43.709419 kernel: pci_bus 0000:00: resource 7 [io 0x0000-0x0cf7 window] Jul 10 00:55:43.709462 kernel: pci_bus 0000:00: resource 8 [io 0x0d00-0xfeff window] Jul 10 00:55:43.709510 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Jul 10 00:55:43.709556 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Jul 10 00:55:43.709601 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Jul 10 00:55:43.709645 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Jul 10 00:55:43.709689 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000dbfff window] Jul 10 00:55:43.710772 kernel: pci_bus 0000:02: resource 6 [mem 0xc0000000-0xfebfffff window] Jul 10 00:55:43.710826 kernel: pci_bus 0000:02: resource 7 [io 0x0000-0x0cf7 window] Jul 10 00:55:43.710875 kernel: pci_bus 0000:02: resource 8 [io 0x0d00-0xfeff window] Jul 10 00:55:43.710926 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Jul 10 00:55:43.710973 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Jul 10 00:55:43.711018 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Jul 10 00:55:43.711071 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Jul 10 00:55:43.711117 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Jul 10 00:55:43.711161 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Jul 10 00:55:43.711212 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Jul 10 00:55:43.711258 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Jul 10 00:55:43.711302 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Jul 10 00:55:43.711351 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Jul 10 00:55:43.711397 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Jul 10 00:55:43.711446 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Jul 10 00:55:43.711490 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Jul 10 00:55:43.711541 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Jul 10 00:55:43.711586 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Jul 10 00:55:43.711635 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Jul 10 00:55:43.711679 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Jul 10 00:55:43.711728 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Jul 10 00:55:43.712804 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Jul 10 00:55:43.712862 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Jul 10 00:55:43.712909 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Jul 10 00:55:43.712953 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Jul 10 00:55:43.713003 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Jul 10 00:55:43.713047 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Jul 10 00:55:43.713093 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Jul 10 00:55:43.713149 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Jul 10 00:55:43.713196 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Jul 10 00:55:43.713240 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Jul 10 00:55:43.713288 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Jul 10 00:55:43.713334 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Jul 10 00:55:43.713384 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Jul 10 00:55:43.713431 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Jul 10 00:55:43.713479 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Jul 10 00:55:43.713525 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Jul 10 00:55:43.713575 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Jul 10 00:55:43.713620 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Jul 10 00:55:43.713670 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Jul 10 00:55:43.713715 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Jul 10 00:55:43.714797 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Jul 10 00:55:43.714851 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Jul 10 00:55:43.714898 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Jul 10 00:55:43.714947 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Jul 10 00:55:43.714993 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Jul 10 00:55:43.715037 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Jul 10 00:55:43.715088 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Jul 10 00:55:43.715133 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Jul 10 00:55:43.715178 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Jul 10 00:55:43.715226 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Jul 10 00:55:43.715271 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Jul 10 00:55:43.715322 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Jul 10 00:55:43.715368 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Jul 10 00:55:43.715419 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Jul 10 00:55:43.715464 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Jul 10 00:55:43.715512 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Jul 10 00:55:43.715557 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Jul 10 00:55:43.715606 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Jul 10 00:55:43.715651 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Jul 10 00:55:43.715706 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Jul 10 00:55:43.716780 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Jul 10 00:55:43.716834 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Jul 10 00:55:43.716885 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Jul 10 00:55:43.716932 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Jul 10 00:55:43.716977 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Jul 10 00:55:43.717028 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Jul 10 00:55:43.717076 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Jul 10 00:55:43.717127 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Jul 10 00:55:43.717172 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Jul 10 00:55:43.717220 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Jul 10 00:55:43.717265 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Jul 10 00:55:43.717315 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Jul 10 00:55:43.717360 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Jul 10 00:55:43.717409 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Jul 10 00:55:43.717455 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Jul 10 00:55:43.717503 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Jul 10 00:55:43.717548 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Jul 10 00:55:43.717604 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Jul 10 00:55:43.717613 kernel: PCI: CLS 32 bytes, default 64 Jul 10 00:55:43.717620 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Jul 10 00:55:43.717627 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Jul 10 00:55:43.717633 kernel: clocksource: Switched to clocksource tsc Jul 10 00:55:43.717640 kernel: Initialise system trusted keyrings Jul 10 00:55:43.717646 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Jul 10 00:55:43.717653 kernel: Key type asymmetric registered Jul 10 00:55:43.717659 kernel: Asymmetric key parser 'x509' registered Jul 10 00:55:43.717667 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 10 00:55:43.717673 kernel: io scheduler mq-deadline registered Jul 10 00:55:43.717680 kernel: io scheduler kyber registered Jul 10 00:55:43.717686 kernel: io scheduler bfq registered Jul 10 00:55:43.718783 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Jul 10 00:55:43.718844 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.718897 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Jul 10 00:55:43.718948 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.719000 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Jul 10 00:55:43.719049 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.719099 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Jul 10 00:55:43.719149 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.719198 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Jul 10 00:55:43.719249 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.719300 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Jul 10 00:55:43.719350 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.719400 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Jul 10 00:55:43.719450 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.719499 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Jul 10 00:55:43.719551 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.719600 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Jul 10 00:55:43.719650 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.719705 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Jul 10 00:55:43.720789 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.720846 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Jul 10 00:55:43.720896 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.720948 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Jul 10 00:55:43.720997 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.721045 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Jul 10 00:55:43.721092 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.721140 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Jul 10 00:55:43.721187 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.721237 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Jul 10 00:55:43.721284 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.721332 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Jul 10 00:55:43.721380 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.721427 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Jul 10 00:55:43.721477 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.721525 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Jul 10 00:55:43.721573 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.721619 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Jul 10 00:55:43.721667 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.724023 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Jul 10 00:55:43.724082 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.724137 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Jul 10 00:55:43.724188 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.724238 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Jul 10 00:55:43.724288 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.724336 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Jul 10 00:55:43.724387 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.724438 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Jul 10 00:55:43.724487 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.724537 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Jul 10 00:55:43.724587 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.724636 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Jul 10 00:55:43.724687 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.724761 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Jul 10 00:55:43.724812 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.724860 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Jul 10 00:55:43.724910 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.724959 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Jul 10 00:55:43.725010 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.725059 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Jul 10 00:55:43.725108 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.725157 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Jul 10 00:55:43.725206 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.725258 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Jul 10 00:55:43.725307 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Jul 10 00:55:43.725317 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 10 00:55:43.725324 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 10 00:55:43.725330 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 10 00:55:43.725337 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Jul 10 00:55:43.725344 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jul 10 00:55:43.725352 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jul 10 00:55:43.725403 kernel: rtc_cmos 00:01: registered as rtc0 Jul 10 00:55:43.725449 kernel: rtc_cmos 00:01: setting system clock to 2025-07-10T00:55:43 UTC (1752108943) Jul 10 00:55:43.725493 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Jul 10 00:55:43.725502 kernel: intel_pstate: CPU model not supported Jul 10 00:55:43.725509 kernel: NET: Registered PF_INET6 protocol family Jul 10 00:55:43.725515 kernel: Segment Routing with IPv6 Jul 10 00:55:43.725521 kernel: In-situ OAM (IOAM) with IPv6 Jul 10 00:55:43.725528 kernel: NET: Registered PF_PACKET protocol family Jul 10 00:55:43.725536 kernel: Key type dns_resolver registered Jul 10 00:55:43.725543 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jul 10 00:55:43.725549 kernel: IPI shorthand broadcast: enabled Jul 10 00:55:43.725556 kernel: sched_clock: Marking stable (856002556, 221636530)->(1140570438, -62931352) Jul 10 00:55:43.725562 kernel: registered taskstats version 1 Jul 10 00:55:43.725568 kernel: Loading compiled-in X.509 certificates Jul 10 00:55:43.725575 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.186-flatcar: 6ebecdd7757c0df63fc51731f0b99957f4e4af16' Jul 10 00:55:43.725581 kernel: Key type .fscrypt registered Jul 10 00:55:43.725587 kernel: Key type fscrypt-provisioning registered Jul 10 00:55:43.725594 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 10 00:55:43.725601 kernel: ima: Allocated hash algorithm: sha1 Jul 10 00:55:43.725607 kernel: ima: No architecture policies found Jul 10 00:55:43.725614 kernel: clk: Disabling unused clocks Jul 10 00:55:43.725620 kernel: Freeing unused kernel image (initmem) memory: 47472K Jul 10 00:55:43.725626 kernel: Write protecting the kernel read-only data: 28672k Jul 10 00:55:43.725633 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 10 00:55:43.725640 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K Jul 10 00:55:43.725647 kernel: Run /init as init process Jul 10 00:55:43.725653 kernel: with arguments: Jul 10 00:55:43.725660 kernel: /init Jul 10 00:55:43.725666 kernel: with environment: Jul 10 00:55:43.725672 kernel: HOME=/ Jul 10 00:55:43.725678 kernel: TERM=linux Jul 10 00:55:43.725684 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 10 00:55:43.725693 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 10 00:55:43.725708 systemd[1]: Detected virtualization vmware. Jul 10 00:55:43.725716 systemd[1]: Detected architecture x86-64. Jul 10 00:55:43.725723 systemd[1]: Running in initrd. Jul 10 00:55:43.725729 systemd[1]: No hostname configured, using default hostname. Jul 10 00:55:43.726765 systemd[1]: Hostname set to . Jul 10 00:55:43.726774 systemd[1]: Initializing machine ID from random generator. Jul 10 00:55:43.726781 systemd[1]: Queued start job for default target initrd.target. Jul 10 00:55:43.726788 systemd[1]: Started systemd-ask-password-console.path. Jul 10 00:55:43.726794 systemd[1]: Reached target cryptsetup.target. Jul 10 00:55:43.726803 systemd[1]: Reached target paths.target. Jul 10 00:55:43.726809 systemd[1]: Reached target slices.target. Jul 10 00:55:43.726816 systemd[1]: Reached target swap.target. Jul 10 00:55:43.726822 systemd[1]: Reached target timers.target. Jul 10 00:55:43.726829 systemd[1]: Listening on iscsid.socket. Jul 10 00:55:43.726836 systemd[1]: Listening on iscsiuio.socket. Jul 10 00:55:43.726842 systemd[1]: Listening on systemd-journald-audit.socket. Jul 10 00:55:43.726850 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 10 00:55:43.726857 systemd[1]: Listening on systemd-journald.socket. Jul 10 00:55:43.726864 systemd[1]: Listening on systemd-networkd.socket. Jul 10 00:55:43.726870 systemd[1]: Listening on systemd-udevd-control.socket. Jul 10 00:55:43.726877 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 10 00:55:43.726884 systemd[1]: Reached target sockets.target. Jul 10 00:55:43.726890 systemd[1]: Starting kmod-static-nodes.service... Jul 10 00:55:43.726897 systemd[1]: Finished network-cleanup.service. Jul 10 00:55:43.726903 systemd[1]: Starting systemd-fsck-usr.service... Jul 10 00:55:43.726911 systemd[1]: Starting systemd-journald.service... Jul 10 00:55:43.726917 systemd[1]: Starting systemd-modules-load.service... Jul 10 00:55:43.726924 systemd[1]: Starting systemd-resolved.service... Jul 10 00:55:43.726932 systemd[1]: Starting systemd-vconsole-setup.service... Jul 10 00:55:43.726938 systemd[1]: Finished kmod-static-nodes.service. Jul 10 00:55:43.726945 systemd[1]: Finished systemd-fsck-usr.service. Jul 10 00:55:43.726952 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 10 00:55:43.726958 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 10 00:55:43.726965 kernel: audit: type=1130 audit(1752108943.657:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:43.726973 systemd[1]: Finished systemd-vconsole-setup.service. Jul 10 00:55:43.726981 kernel: audit: type=1130 audit(1752108943.665:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:43.726987 systemd[1]: Starting dracut-cmdline-ask.service... Jul 10 00:55:43.726994 systemd[1]: Started systemd-resolved.service. Jul 10 00:55:43.727001 kernel: audit: type=1130 audit(1752108943.674:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:43.727007 systemd[1]: Reached target nss-lookup.target. Jul 10 00:55:43.727014 systemd[1]: Finished dracut-cmdline-ask.service. Jul 10 00:55:43.727020 kernel: audit: type=1130 audit(1752108943.683:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:43.727028 systemd[1]: Starting dracut-cmdline.service... Jul 10 00:55:43.727035 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 10 00:55:43.727042 kernel: Bridge firewalling registered Jul 10 00:55:43.727052 systemd-journald[216]: Journal started Jul 10 00:55:43.727088 systemd-journald[216]: Runtime Journal (/run/log/journal/6be4aa318e1d4986a6ff87e3cd925638) is 4.8M, max 38.8M, 34.0M free. Jul 10 00:55:43.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:43.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:43.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:43.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:43.645670 systemd-modules-load[217]: Inserted module 'overlay' Jul 10 00:55:43.672591 systemd-resolved[218]: Positive Trust Anchors: Jul 10 00:55:43.730531 systemd[1]: Started systemd-journald.service. Jul 10 00:55:43.730544 kernel: audit: type=1130 audit(1752108943.726:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:43.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:43.672597 systemd-resolved[218]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 10 00:55:43.731775 kernel: SCSI subsystem initialized Jul 10 00:55:43.672617 systemd-resolved[218]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 10 00:55:43.674596 systemd-resolved[218]: Defaulting to hostname 'linux'. Jul 10 00:55:43.705775 systemd-modules-load[217]: Inserted module 'br_netfilter' Jul 10 00:55:43.732869 dracut-cmdline[232]: dracut-dracut-053 Jul 10 00:55:43.732869 dracut-cmdline[232]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Jul 10 00:55:43.732869 dracut-cmdline[232]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=6cddad5f675165861f6062277cc28875548c735477e689762fc73abc16b63a3d Jul 10 00:55:43.741657 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 10 00:55:43.741677 kernel: device-mapper: uevent: version 1.0.3 Jul 10 00:55:43.741686 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 10 00:55:43.744907 kernel: Loading iSCSI transport class v2.0-870. Jul 10 00:55:43.744640 systemd-modules-load[217]: Inserted module 'dm_multipath' Jul 10 00:55:43.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:43.745884 systemd[1]: Finished systemd-modules-load.service. Jul 10 00:55:43.746386 systemd[1]: Starting systemd-sysctl.service... Jul 10 00:55:43.749745 kernel: audit: type=1130 audit(1752108943.744:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:43.752514 systemd[1]: Finished systemd-sysctl.service. Jul 10 00:55:43.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:43.755743 kernel: audit: type=1130 audit(1752108943.750:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:43.759742 kernel: iscsi: registered transport (tcp) Jul 10 00:55:43.776797 kernel: iscsi: registered transport (qla4xxx) Jul 10 00:55:43.776819 kernel: QLogic iSCSI HBA Driver Jul 10 00:55:43.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:43.793405 systemd[1]: Finished dracut-cmdline.service. Jul 10 00:55:43.796965 kernel: audit: type=1130 audit(1752108943.791:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:43.794037 systemd[1]: Starting dracut-pre-udev.service... Jul 10 00:55:43.831749 kernel: raid6: avx2x4 gen() 48162 MB/s Jul 10 00:55:43.848774 kernel: raid6: avx2x4 xor() 21788 MB/s Jul 10 00:55:43.865746 kernel: raid6: avx2x2 gen() 53291 MB/s Jul 10 00:55:43.882742 kernel: raid6: avx2x2 xor() 31780 MB/s Jul 10 00:55:43.899745 kernel: raid6: avx2x1 gen() 44553 MB/s Jul 10 00:55:43.916747 kernel: raid6: avx2x1 xor() 27527 MB/s Jul 10 00:55:43.933771 kernel: raid6: sse2x4 gen() 20910 MB/s Jul 10 00:55:43.950745 kernel: raid6: sse2x4 xor() 11784 MB/s Jul 10 00:55:43.967750 kernel: raid6: sse2x2 gen() 21304 MB/s Jul 10 00:55:43.984774 kernel: raid6: sse2x2 xor() 13171 MB/s Jul 10 00:55:44.001746 kernel: raid6: sse2x1 gen() 18184 MB/s Jul 10 00:55:44.019124 kernel: raid6: sse2x1 xor() 8770 MB/s Jul 10 00:55:44.019160 kernel: raid6: using algorithm avx2x2 gen() 53291 MB/s Jul 10 00:55:44.019169 kernel: raid6: .... xor() 31780 MB/s, rmw enabled Jul 10 00:55:44.019745 kernel: raid6: using avx2x2 recovery algorithm Jul 10 00:55:44.028744 kernel: xor: automatically using best checksumming function avx Jul 10 00:55:44.090752 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 10 00:55:44.095506 systemd[1]: Finished dracut-pre-udev.service. Jul 10 00:55:44.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:44.096161 systemd[1]: Starting systemd-udevd.service... Jul 10 00:55:44.094000 audit: BPF prog-id=7 op=LOAD Jul 10 00:55:44.094000 audit: BPF prog-id=8 op=LOAD Jul 10 00:55:44.098753 kernel: audit: type=1130 audit(1752108944.093:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:44.106861 systemd-udevd[415]: Using default interface naming scheme 'v252'. Jul 10 00:55:44.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:44.109788 systemd[1]: Started systemd-udevd.service. Jul 10 00:55:44.110457 systemd[1]: Starting dracut-pre-trigger.service... Jul 10 00:55:44.118506 dracut-pre-trigger[420]: rd.md=0: removing MD RAID activation Jul 10 00:55:44.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:44.136548 systemd[1]: Finished dracut-pre-trigger.service. Jul 10 00:55:44.137160 systemd[1]: Starting systemd-udev-trigger.service... Jul 10 00:55:44.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:44.202025 systemd[1]: Finished systemd-udev-trigger.service. Jul 10 00:55:44.256771 kernel: VMware PVSCSI driver - version 1.0.7.0-k Jul 10 00:55:44.264933 kernel: vmw_pvscsi: using 64bit dma Jul 10 00:55:44.264959 kernel: vmw_pvscsi: max_id: 16 Jul 10 00:55:44.264968 kernel: vmw_pvscsi: setting ring_pages to 8 Jul 10 00:55:44.269742 kernel: libata version 3.00 loaded. Jul 10 00:55:44.275898 kernel: ata_piix 0000:00:07.1: version 2.13 Jul 10 00:55:44.279915 kernel: scsi host1: ata_piix Jul 10 00:55:44.280000 kernel: scsi host2: ata_piix Jul 10 00:55:44.280061 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Jul 10 00:55:44.280069 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Jul 10 00:55:44.280076 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Jul 10 00:55:44.282805 kernel: vmw_pvscsi: enabling reqCallThreshold Jul 10 00:55:44.282822 kernel: vmw_pvscsi: driver-based request coalescing enabled Jul 10 00:55:44.282830 kernel: vmw_pvscsi: using MSI-X Jul 10 00:55:44.284474 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Jul 10 00:55:44.290746 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 Jul 10 00:55:44.295657 kernel: cryptd: max_cpu_qlen set to 1000 Jul 10 00:55:44.295673 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Jul 10 00:55:44.297742 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Jul 10 00:55:44.297869 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Jul 10 00:55:44.446749 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Jul 10 00:55:44.450759 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Jul 10 00:55:44.457787 kernel: AVX2 version of gcm_enc/dec engaged. Jul 10 00:55:44.457812 kernel: AES CTR mode by8 optimization enabled Jul 10 00:55:44.460032 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Jul 10 00:55:44.468016 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Jul 10 00:55:44.473517 kernel: sd 0:0:0:0: [sda] Write Protect is off Jul 10 00:55:44.473596 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 Jul 10 00:55:44.473660 kernel: sd 0:0:0:0: [sda] Cache data unavailable Jul 10 00:55:44.473727 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through Jul 10 00:55:44.473839 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 10 00:55:44.473855 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Jul 10 00:55:44.492886 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Jul 10 00:55:44.509188 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jul 10 00:55:44.509199 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/sda6 scanned by (udev-worker) (463) Jul 10 00:55:44.509207 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Jul 10 00:55:44.499211 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 10 00:55:44.503257 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 10 00:55:44.503362 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 10 00:55:44.505320 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 10 00:55:44.508821 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 10 00:55:44.509333 systemd[1]: Starting disk-uuid.service... Jul 10 00:55:44.534749 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 10 00:55:44.542750 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 10 00:55:45.539255 disk-uuid[548]: The operation has completed successfully. Jul 10 00:55:45.539752 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 10 00:55:45.576337 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 10 00:55:45.576393 systemd[1]: Finished disk-uuid.service. Jul 10 00:55:45.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:45.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:45.577041 systemd[1]: Starting verity-setup.service... Jul 10 00:55:45.587757 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Jul 10 00:55:45.645094 systemd[1]: Found device dev-mapper-usr.device. Jul 10 00:55:45.645824 systemd[1]: Mounting sysusr-usr.mount... Jul 10 00:55:45.647394 systemd[1]: Finished verity-setup.service. Jul 10 00:55:45.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:45.698745 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 10 00:55:45.698794 systemd[1]: Mounted sysusr-usr.mount. Jul 10 00:55:45.699386 systemd[1]: Starting afterburn-network-kargs.service... Jul 10 00:55:45.699902 systemd[1]: Starting ignition-setup.service... Jul 10 00:55:45.715076 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 10 00:55:45.715102 kernel: BTRFS info (device sda6): using free space tree Jul 10 00:55:45.715110 kernel: BTRFS info (device sda6): has skinny extents Jul 10 00:55:45.720775 kernel: BTRFS info (device sda6): enabling ssd optimizations Jul 10 00:55:45.727596 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 10 00:55:45.734905 systemd[1]: Finished ignition-setup.service. Jul 10 00:55:45.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:45.735467 systemd[1]: Starting ignition-fetch-offline.service... Jul 10 00:55:45.780876 systemd[1]: Finished afterburn-network-kargs.service. Jul 10 00:55:45.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:45.781482 systemd[1]: Starting parse-ip-for-networkd.service... Jul 10 00:55:45.833613 systemd[1]: Finished parse-ip-for-networkd.service. Jul 10 00:55:45.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:45.832000 audit: BPF prog-id=9 op=LOAD Jul 10 00:55:45.834488 systemd[1]: Starting systemd-networkd.service... Jul 10 00:55:45.850293 systemd-networkd[732]: lo: Link UP Jul 10 00:55:45.850297 systemd-networkd[732]: lo: Gained carrier Jul 10 00:55:45.851095 systemd-networkd[732]: Enumeration completed Jul 10 00:55:45.851436 systemd[1]: Started systemd-networkd.service. Jul 10 00:55:45.854815 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Jul 10 00:55:45.854911 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Jul 10 00:55:45.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:45.851563 systemd-networkd[732]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Jul 10 00:55:45.854554 systemd[1]: Reached target network.target. Jul 10 00:55:45.855829 systemd-networkd[732]: ens192: Link UP Jul 10 00:55:45.855832 systemd-networkd[732]: ens192: Gained carrier Jul 10 00:55:45.855863 systemd[1]: Starting iscsiuio.service... Jul 10 00:55:45.861196 systemd[1]: Started iscsiuio.service. Jul 10 00:55:45.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:45.862012 systemd[1]: Starting iscsid.service... Jul 10 00:55:45.864485 iscsid[737]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 10 00:55:45.864485 iscsid[737]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 10 00:55:45.864485 iscsid[737]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 10 00:55:45.864485 iscsid[737]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 10 00:55:45.864485 iscsid[737]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 10 00:55:45.864485 iscsid[737]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 10 00:55:45.865632 systemd[1]: Started iscsid.service. Jul 10 00:55:45.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:45.866316 systemd[1]: Starting dracut-initqueue.service... Jul 10 00:55:45.868280 ignition[604]: Ignition 2.14.0 Jul 10 00:55:45.868286 ignition[604]: Stage: fetch-offline Jul 10 00:55:45.868320 ignition[604]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 10 00:55:45.868335 ignition[604]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Jul 10 00:55:45.872149 ignition[604]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Jul 10 00:55:45.872228 ignition[604]: parsed url from cmdline: "" Jul 10 00:55:45.872230 ignition[604]: no config URL provided Jul 10 00:55:45.872233 ignition[604]: reading system config file "/usr/lib/ignition/user.ign" Jul 10 00:55:45.872238 ignition[604]: no config at "/usr/lib/ignition/user.ign" Jul 10 00:55:45.873914 systemd[1]: Finished dracut-initqueue.service. Jul 10 00:55:45.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:45.874224 systemd[1]: Reached target remote-fs-pre.target. Jul 10 00:55:45.874442 systemd[1]: Reached target remote-cryptsetup.target. Jul 10 00:55:45.874654 systemd[1]: Reached target remote-fs.target. Jul 10 00:55:45.875278 systemd[1]: Starting dracut-pre-mount.service... Jul 10 00:55:45.880227 systemd[1]: Finished dracut-pre-mount.service. Jul 10 00:55:45.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:45.881168 ignition[604]: config successfully fetched Jul 10 00:55:45.881191 ignition[604]: parsing config with SHA512: 87fa74af3221cb5fcc174a71c4b5b9424ae3b47bfbc494d54e09efe82dd6abb54d4310eb74d02f707b669fa2019fb1753ba908ddc36277acd516608a03641eab Jul 10 00:55:45.884495 unknown[604]: fetched base config from "system" Jul 10 00:55:45.884504 unknown[604]: fetched user config from "vmware" Jul 10 00:55:45.884895 ignition[604]: fetch-offline: fetch-offline passed Jul 10 00:55:45.884940 ignition[604]: Ignition finished successfully Jul 10 00:55:45.885573 systemd[1]: Finished ignition-fetch-offline.service. Jul 10 00:55:45.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:45.885893 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Jul 10 00:55:45.886466 systemd[1]: Starting ignition-kargs.service... Jul 10 00:55:45.891397 ignition[752]: Ignition 2.14.0 Jul 10 00:55:45.891404 ignition[752]: Stage: kargs Jul 10 00:55:45.891463 ignition[752]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 10 00:55:45.891475 ignition[752]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Jul 10 00:55:45.892846 ignition[752]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Jul 10 00:55:45.894317 ignition[752]: kargs: kargs passed Jul 10 00:55:45.894343 ignition[752]: Ignition finished successfully Jul 10 00:55:45.895102 systemd[1]: Finished ignition-kargs.service. Jul 10 00:55:45.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:45.895706 systemd[1]: Starting ignition-disks.service... Jul 10 00:55:45.900050 ignition[759]: Ignition 2.14.0 Jul 10 00:55:45.900280 ignition[759]: Stage: disks Jul 10 00:55:45.900464 ignition[759]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 10 00:55:45.900613 ignition[759]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Jul 10 00:55:45.902007 ignition[759]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Jul 10 00:55:45.903584 ignition[759]: disks: disks passed Jul 10 00:55:45.903727 ignition[759]: Ignition finished successfully Jul 10 00:55:45.904299 systemd[1]: Finished ignition-disks.service. Jul 10 00:55:45.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:45.904476 systemd[1]: Reached target initrd-root-device.target. Jul 10 00:55:45.904585 systemd[1]: Reached target local-fs-pre.target. Jul 10 00:55:45.904750 systemd[1]: Reached target local-fs.target. Jul 10 00:55:45.904920 systemd[1]: Reached target sysinit.target. Jul 10 00:55:45.905102 systemd[1]: Reached target basic.target. Jul 10 00:55:45.905753 systemd[1]: Starting systemd-fsck-root.service... Jul 10 00:55:45.916850 systemd-fsck[767]: ROOT: clean, 619/1628000 files, 124060/1617920 blocks Jul 10 00:55:45.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:45.918945 systemd[1]: Finished systemd-fsck-root.service. Jul 10 00:55:45.919550 systemd[1]: Mounting sysroot.mount... Jul 10 00:55:45.928353 systemd[1]: Mounted sysroot.mount. Jul 10 00:55:45.928853 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 10 00:55:45.928512 systemd[1]: Reached target initrd-root-fs.target. Jul 10 00:55:45.929581 systemd[1]: Mounting sysroot-usr.mount... Jul 10 00:55:45.930023 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 10 00:55:45.930050 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 10 00:55:45.930067 systemd[1]: Reached target ignition-diskful.target. Jul 10 00:55:45.931578 systemd[1]: Mounted sysroot-usr.mount. Jul 10 00:55:45.932268 systemd[1]: Starting initrd-setup-root.service... Jul 10 00:55:45.935385 initrd-setup-root[777]: cut: /sysroot/etc/passwd: No such file or directory Jul 10 00:55:45.939646 initrd-setup-root[785]: cut: /sysroot/etc/group: No such file or directory Jul 10 00:55:45.941473 initrd-setup-root[793]: cut: /sysroot/etc/shadow: No such file or directory Jul 10 00:55:45.943578 initrd-setup-root[801]: cut: /sysroot/etc/gshadow: No such file or directory Jul 10 00:55:45.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:45.971757 systemd[1]: Finished initrd-setup-root.service. Jul 10 00:55:45.972327 systemd[1]: Starting ignition-mount.service... Jul 10 00:55:45.972773 systemd[1]: Starting sysroot-boot.service... Jul 10 00:55:45.976452 bash[818]: umount: /sysroot/usr/share/oem: not mounted. Jul 10 00:55:45.981396 ignition[819]: INFO : Ignition 2.14.0 Jul 10 00:55:45.981396 ignition[819]: INFO : Stage: mount Jul 10 00:55:45.981703 ignition[819]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 10 00:55:45.981703 ignition[819]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Jul 10 00:55:45.982717 ignition[819]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Jul 10 00:55:45.984212 ignition[819]: INFO : mount: mount passed Jul 10 00:55:45.984325 ignition[819]: INFO : Ignition finished successfully Jul 10 00:55:45.984810 systemd[1]: Finished ignition-mount.service. Jul 10 00:55:45.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:45.992347 systemd[1]: Finished sysroot-boot.service. Jul 10 00:55:45.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:46.659953 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 10 00:55:46.668750 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/sda6 scanned by mount (828) Jul 10 00:55:46.671118 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 10 00:55:46.671139 kernel: BTRFS info (device sda6): using free space tree Jul 10 00:55:46.671149 kernel: BTRFS info (device sda6): has skinny extents Jul 10 00:55:46.675744 kernel: BTRFS info (device sda6): enabling ssd optimizations Jul 10 00:55:46.676626 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 10 00:55:46.677290 systemd[1]: Starting ignition-files.service... Jul 10 00:55:46.686263 ignition[848]: INFO : Ignition 2.14.0 Jul 10 00:55:46.686263 ignition[848]: INFO : Stage: files Jul 10 00:55:46.686572 ignition[848]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 10 00:55:46.686572 ignition[848]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Jul 10 00:55:46.687601 ignition[848]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Jul 10 00:55:46.689617 ignition[848]: DEBUG : files: compiled without relabeling support, skipping Jul 10 00:55:46.690102 ignition[848]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 10 00:55:46.690102 ignition[848]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 10 00:55:46.692350 ignition[848]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 10 00:55:46.692578 ignition[848]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 10 00:55:46.692995 unknown[848]: wrote ssh authorized keys file for user: core Jul 10 00:55:46.693193 ignition[848]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 10 00:55:46.693522 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" Jul 10 00:55:46.693727 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 Jul 10 00:55:46.758041 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Jul 10 00:55:47.176420 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" Jul 10 00:55:47.176750 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Jul 10 00:55:47.177124 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Jul 10 00:55:47.177307 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Jul 10 00:55:47.177704 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Jul 10 00:55:47.177704 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 10 00:55:47.178078 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 10 00:55:47.178078 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 10 00:55:47.178428 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 10 00:55:47.178428 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 10 00:55:47.178785 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 10 00:55:47.178785 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Jul 10 00:55:47.178785 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Jul 10 00:55:47.178785 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Jul 10 00:55:47.178785 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Jul 10 00:55:47.183293 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2240834418" Jul 10 00:55:47.184805 ignition[848]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2240834418": device or resource busy Jul 10 00:55:47.184805 ignition[848]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2240834418", trying btrfs: device or resource busy Jul 10 00:55:47.184805 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2240834418" Jul 10 00:55:47.185373 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2240834418" Jul 10 00:55:47.186503 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2240834418" Jul 10 00:55:47.186675 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2240834418" Jul 10 00:55:47.186675 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Jul 10 00:55:47.186675 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Jul 10 00:55:47.186675 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 Jul 10 00:55:47.187441 systemd[1]: mnt-oem2240834418.mount: Deactivated successfully. Jul 10 00:55:47.514089 systemd-networkd[732]: ens192: Gained IPv6LL Jul 10 00:55:47.948447 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Jul 10 00:55:48.174028 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Jul 10 00:55:48.174297 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Jul 10 00:55:48.174467 ignition[848]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Jul 10 00:55:48.174467 ignition[848]: INFO : files: op(10): [started] processing unit "vmtoolsd.service" Jul 10 00:55:48.174467 ignition[848]: INFO : files: op(10): [finished] processing unit "vmtoolsd.service" Jul 10 00:55:48.174467 ignition[848]: INFO : files: op(11): [started] processing unit "prepare-helm.service" Jul 10 00:55:48.174467 ignition[848]: INFO : files: op(11): op(12): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 10 00:55:48.174467 ignition[848]: INFO : files: op(11): op(12): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 10 00:55:48.174467 ignition[848]: INFO : files: op(11): [finished] processing unit "prepare-helm.service" Jul 10 00:55:48.174467 ignition[848]: INFO : files: op(13): [started] processing unit "coreos-metadata.service" Jul 10 00:55:48.174467 ignition[848]: INFO : files: op(13): op(14): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 10 00:55:48.175895 ignition[848]: INFO : files: op(13): op(14): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 10 00:55:48.175895 ignition[848]: INFO : files: op(13): [finished] processing unit "coreos-metadata.service" Jul 10 00:55:48.175895 ignition[848]: INFO : files: op(15): [started] setting preset to disabled for "coreos-metadata.service" Jul 10 00:55:48.175895 ignition[848]: INFO : files: op(15): op(16): [started] removing enablement symlink(s) for "coreos-metadata.service" Jul 10 00:55:48.257629 ignition[848]: INFO : files: op(15): op(16): [finished] removing enablement symlink(s) for "coreos-metadata.service" Jul 10 00:55:48.257843 ignition[848]: INFO : files: op(15): [finished] setting preset to disabled for "coreos-metadata.service" Jul 10 00:55:48.257843 ignition[848]: INFO : files: op(17): [started] setting preset to enabled for "vmtoolsd.service" Jul 10 00:55:48.257843 ignition[848]: INFO : files: op(17): [finished] setting preset to enabled for "vmtoolsd.service" Jul 10 00:55:48.257843 ignition[848]: INFO : files: op(18): [started] setting preset to enabled for "prepare-helm.service" Jul 10 00:55:48.257843 ignition[848]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-helm.service" Jul 10 00:55:48.257843 ignition[848]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 10 00:55:48.258766 ignition[848]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 10 00:55:48.258766 ignition[848]: INFO : files: files passed Jul 10 00:55:48.258766 ignition[848]: INFO : Ignition finished successfully Jul 10 00:55:48.258513 systemd[1]: Finished ignition-files.service. Jul 10 00:55:48.261045 kernel: kauditd_printk_skb: 24 callbacks suppressed Jul 10 00:55:48.261071 kernel: audit: type=1130 audit(1752108948.256:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.259799 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 10 00:55:48.262416 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 10 00:55:48.262839 systemd[1]: Starting ignition-quench.service... Jul 10 00:55:48.265639 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 10 00:55:48.265690 systemd[1]: Finished ignition-quench.service. Jul 10 00:55:48.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.266779 initrd-setup-root-after-ignition[874]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 10 00:55:48.268640 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 10 00:55:48.273613 kernel: audit: type=1130 audit(1752108948.264:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.273628 kernel: audit: type=1131 audit(1752108948.264:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.273637 kernel: audit: type=1130 audit(1752108948.269:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.271100 systemd[1]: Reached target ignition-complete.target. Jul 10 00:55:48.274113 systemd[1]: Starting initrd-parse-etc.service... Jul 10 00:55:48.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.281970 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 10 00:55:48.287061 kernel: audit: type=1130 audit(1752108948.280:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.287077 kernel: audit: type=1131 audit(1752108948.280:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.282029 systemd[1]: Finished initrd-parse-etc.service. Jul 10 00:55:48.282190 systemd[1]: Reached target initrd-fs.target. Jul 10 00:55:48.286967 systemd[1]: Reached target initrd.target. Jul 10 00:55:48.287156 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 10 00:55:48.287712 systemd[1]: Starting dracut-pre-pivot.service... Jul 10 00:55:48.294817 systemd[1]: Finished dracut-pre-pivot.service. Jul 10 00:55:48.295558 systemd[1]: Starting initrd-cleanup.service... Jul 10 00:55:48.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.298744 kernel: audit: type=1130 audit(1752108948.293:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.301452 systemd[1]: Stopped target nss-lookup.target. Jul 10 00:55:48.301750 systemd[1]: Stopped target remote-cryptsetup.target. Jul 10 00:55:48.302025 systemd[1]: Stopped target timers.target. Jul 10 00:55:48.302274 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 10 00:55:48.302473 systemd[1]: Stopped dracut-pre-pivot.service. Jul 10 00:55:48.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.303816 systemd[1]: Stopped target initrd.target. Jul 10 00:55:48.305267 systemd[1]: Stopped target basic.target. Jul 10 00:55:48.305446 systemd[1]: Stopped target ignition-complete.target. Jul 10 00:55:48.305618 systemd[1]: Stopped target ignition-diskful.target. Jul 10 00:55:48.305811 kernel: audit: type=1131 audit(1752108948.300:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.305799 systemd[1]: Stopped target initrd-root-device.target. Jul 10 00:55:48.305971 systemd[1]: Stopped target remote-fs.target. Jul 10 00:55:48.306132 systemd[1]: Stopped target remote-fs-pre.target. Jul 10 00:55:48.306311 systemd[1]: Stopped target sysinit.target. Jul 10 00:55:48.306478 systemd[1]: Stopped target local-fs.target. Jul 10 00:55:48.306641 systemd[1]: Stopped target local-fs-pre.target. Jul 10 00:55:48.306813 systemd[1]: Stopped target swap.target. Jul 10 00:55:48.306947 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 10 00:55:48.307026 systemd[1]: Stopped dracut-pre-mount.service. Jul 10 00:55:48.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.307292 systemd[1]: Stopped target cryptsetup.target. Jul 10 00:55:48.309787 kernel: audit: type=1131 audit(1752108948.305:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.309759 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 10 00:55:48.309836 systemd[1]: Stopped dracut-initqueue.service. Jul 10 00:55:48.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.310086 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 10 00:55:48.310161 systemd[1]: Stopped ignition-fetch-offline.service. Jul 10 00:55:48.312748 kernel: audit: type=1131 audit(1752108948.308:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.312921 systemd[1]: Stopped target paths.target. Jul 10 00:55:48.313175 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 10 00:55:48.316758 systemd[1]: Stopped systemd-ask-password-console.path. Jul 10 00:55:48.317083 systemd[1]: Stopped target slices.target. Jul 10 00:55:48.317353 systemd[1]: Stopped target sockets.target. Jul 10 00:55:48.317626 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 10 00:55:48.317866 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 10 00:55:48.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.318226 systemd[1]: ignition-files.service: Deactivated successfully. Jul 10 00:55:48.318460 systemd[1]: Stopped ignition-files.service. Jul 10 00:55:48.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.319290 systemd[1]: Stopping ignition-mount.service... Jul 10 00:55:48.319668 systemd[1]: Stopping iscsid.service... Jul 10 00:55:48.319887 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 10 00:55:48.320108 systemd[1]: Stopped kmod-static-nodes.service. Jul 10 00:55:48.320859 systemd[1]: Stopping sysroot-boot.service... Jul 10 00:55:48.321080 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 10 00:55:48.321311 systemd[1]: Stopped systemd-udev-trigger.service. Jul 10 00:55:48.321712 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 10 00:55:48.322000 systemd[1]: Stopped dracut-pre-trigger.service. Jul 10 00:55:48.322824 iscsid[737]: iscsid shutting down. Jul 10 00:55:48.324538 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 10 00:55:48.324799 systemd[1]: Finished initrd-cleanup.service. Jul 10 00:55:48.325185 systemd[1]: iscsid.service: Deactivated successfully. Jul 10 00:55:48.325378 systemd[1]: Stopped iscsid.service. Jul 10 00:55:48.325555 ignition[887]: INFO : Ignition 2.14.0 Jul 10 00:55:48.325555 ignition[887]: INFO : Stage: umount Jul 10 00:55:48.325863 ignition[887]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 10 00:55:48.325863 ignition[887]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Jul 10 00:55:48.326938 systemd[1]: iscsid.socket: Deactivated successfully. Jul 10 00:55:48.327074 ignition[887]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Jul 10 00:55:48.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.327361 systemd[1]: Closed iscsid.socket. Jul 10 00:55:48.328019 systemd[1]: Stopping iscsiuio.service... Jul 10 00:55:48.330483 ignition[887]: INFO : umount: umount passed Jul 10 00:55:48.330483 ignition[887]: INFO : Ignition finished successfully Jul 10 00:55:48.330867 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 10 00:55:48.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.330921 systemd[1]: Stopped iscsiuio.service. Jul 10 00:55:48.331112 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 10 00:55:48.331154 systemd[1]: Stopped ignition-mount.service. Jul 10 00:55:48.331319 systemd[1]: Stopped target network.target. Jul 10 00:55:48.331413 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 10 00:55:48.331430 systemd[1]: Closed iscsiuio.socket. Jul 10 00:55:48.331513 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 10 00:55:48.331533 systemd[1]: Stopped ignition-disks.service. Jul 10 00:55:48.331630 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 10 00:55:48.331648 systemd[1]: Stopped ignition-kargs.service. Jul 10 00:55:48.331751 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 10 00:55:48.331769 systemd[1]: Stopped ignition-setup.service. Jul 10 00:55:48.331915 systemd[1]: Stopping systemd-networkd.service... Jul 10 00:55:48.332240 systemd[1]: Stopping systemd-resolved.service... Jul 10 00:55:48.336301 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 10 00:55:48.339640 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 10 00:55:48.339717 systemd[1]: Stopped systemd-resolved.service. Jul 10 00:55:48.340277 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 10 00:55:48.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.340332 systemd[1]: Stopped systemd-networkd.service. Jul 10 00:55:48.340701 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 10 00:55:48.340719 systemd[1]: Closed systemd-networkd.socket. Jul 10 00:55:48.341200 systemd[1]: Stopping network-cleanup.service... Jul 10 00:55:48.341646 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 10 00:55:48.341681 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 10 00:55:48.341869 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Jul 10 00:55:48.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.341000 audit: BPF prog-id=6 op=UNLOAD Jul 10 00:55:48.341000 audit: BPF prog-id=9 op=UNLOAD Jul 10 00:55:48.341890 systemd[1]: Stopped afterburn-network-kargs.service. Jul 10 00:55:48.341989 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 10 00:55:48.342011 systemd[1]: Stopped systemd-sysctl.service. Jul 10 00:55:48.342150 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 10 00:55:48.342170 systemd[1]: Stopped systemd-modules-load.service. Jul 10 00:55:48.344846 systemd[1]: Stopping systemd-udevd.service... Jul 10 00:55:48.345643 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 10 00:55:48.347680 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 10 00:55:48.348504 systemd[1]: Stopped network-cleanup.service. Jul 10 00:55:48.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.348901 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 10 00:55:48.349105 systemd[1]: Stopped systemd-udevd.service. Jul 10 00:55:48.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.349572 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 10 00:55:48.349766 systemd[1]: Closed systemd-udevd-control.socket. Jul 10 00:55:48.349990 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 10 00:55:48.350152 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 10 00:55:48.350360 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 10 00:55:48.350522 systemd[1]: Stopped dracut-pre-udev.service. Jul 10 00:55:48.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.350837 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 10 00:55:48.350989 systemd[1]: Stopped dracut-cmdline.service. Jul 10 00:55:48.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.351246 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 10 00:55:48.351399 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 10 00:55:48.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.352070 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 10 00:55:48.352359 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 10 00:55:48.352526 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 10 00:55:48.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.355270 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 10 00:55:48.355477 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 10 00:55:48.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.397338 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 10 00:55:48.397420 systemd[1]: Stopped sysroot-boot.service. Jul 10 00:55:48.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.397800 systemd[1]: Reached target initrd-switch-root.target. Jul 10 00:55:48.397957 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 10 00:55:48.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:48.397991 systemd[1]: Stopped initrd-setup-root.service. Jul 10 00:55:48.398756 systemd[1]: Starting initrd-switch-root.service... Jul 10 00:55:48.407955 systemd[1]: Switching root. Jul 10 00:55:48.424483 systemd-journald[216]: Journal stopped Jul 10 00:55:51.625386 systemd-journald[216]: Received SIGTERM from PID 1 (systemd). Jul 10 00:55:51.625410 kernel: SELinux: Class mctp_socket not defined in policy. Jul 10 00:55:51.625423 kernel: SELinux: Class anon_inode not defined in policy. Jul 10 00:55:51.625430 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 10 00:55:51.625436 kernel: SELinux: policy capability network_peer_controls=1 Jul 10 00:55:51.625445 kernel: SELinux: policy capability open_perms=1 Jul 10 00:55:51.625454 kernel: SELinux: policy capability extended_socket_class=1 Jul 10 00:55:51.625461 kernel: SELinux: policy capability always_check_network=0 Jul 10 00:55:51.625467 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 10 00:55:51.625472 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 10 00:55:51.625478 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 10 00:55:51.625483 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 10 00:55:51.625493 systemd[1]: Successfully loaded SELinux policy in 124.289ms. Jul 10 00:55:51.625501 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.560ms. Jul 10 00:55:51.625511 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 10 00:55:51.625522 systemd[1]: Detected virtualization vmware. Jul 10 00:55:51.625532 systemd[1]: Detected architecture x86-64. Jul 10 00:55:51.625539 systemd[1]: Detected first boot. Jul 10 00:55:51.625546 systemd[1]: Initializing machine ID from random generator. Jul 10 00:55:51.625556 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 10 00:55:51.625563 systemd[1]: Populated /etc with preset unit settings. Jul 10 00:55:51.625570 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 10 00:55:51.625578 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 10 00:55:51.625587 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 10 00:55:51.625608 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 10 00:55:51.625619 systemd[1]: Stopped initrd-switch-root.service. Jul 10 00:55:51.625627 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 10 00:55:51.625634 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 10 00:55:51.625642 systemd[1]: Created slice system-addon\x2drun.slice. Jul 10 00:55:51.625650 systemd[1]: Created slice system-getty.slice. Jul 10 00:55:51.625656 systemd[1]: Created slice system-modprobe.slice. Jul 10 00:55:51.625667 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 10 00:55:51.625674 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 10 00:55:51.625681 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 10 00:55:51.625689 systemd[1]: Created slice user.slice. Jul 10 00:55:51.625696 systemd[1]: Started systemd-ask-password-console.path. Jul 10 00:55:51.625703 systemd[1]: Started systemd-ask-password-wall.path. Jul 10 00:55:51.625713 systemd[1]: Set up automount boot.automount. Jul 10 00:55:51.625722 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 10 00:55:51.625738 systemd[1]: Stopped target initrd-switch-root.target. Jul 10 00:55:51.625751 systemd[1]: Stopped target initrd-fs.target. Jul 10 00:55:51.625761 systemd[1]: Stopped target initrd-root-fs.target. Jul 10 00:55:51.625770 systemd[1]: Reached target integritysetup.target. Jul 10 00:55:51.625777 systemd[1]: Reached target remote-cryptsetup.target. Jul 10 00:55:51.625784 systemd[1]: Reached target remote-fs.target. Jul 10 00:55:51.627133 systemd[1]: Reached target slices.target. Jul 10 00:55:51.627148 systemd[1]: Reached target swap.target. Jul 10 00:55:51.627159 systemd[1]: Reached target torcx.target. Jul 10 00:55:51.627169 systemd[1]: Reached target veritysetup.target. Jul 10 00:55:51.627178 systemd[1]: Listening on systemd-coredump.socket. Jul 10 00:55:51.627185 systemd[1]: Listening on systemd-initctl.socket. Jul 10 00:55:51.627193 systemd[1]: Listening on systemd-networkd.socket. Jul 10 00:55:51.627203 systemd[1]: Listening on systemd-udevd-control.socket. Jul 10 00:55:51.627211 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 10 00:55:51.627222 systemd[1]: Listening on systemd-userdbd.socket. Jul 10 00:55:51.627230 systemd[1]: Mounting dev-hugepages.mount... Jul 10 00:55:51.627237 systemd[1]: Mounting dev-mqueue.mount... Jul 10 00:55:51.627245 systemd[1]: Mounting media.mount... Jul 10 00:55:51.627253 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:55:51.627260 systemd[1]: Mounting sys-kernel-debug.mount... Jul 10 00:55:51.627267 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 10 00:55:51.627276 systemd[1]: Mounting tmp.mount... Jul 10 00:55:51.627283 systemd[1]: Starting flatcar-tmpfiles.service... Jul 10 00:55:51.627290 systemd[1]: Starting ignition-delete-config.service... Jul 10 00:55:51.627297 systemd[1]: Starting kmod-static-nodes.service... Jul 10 00:55:51.627304 systemd[1]: Starting modprobe@configfs.service... Jul 10 00:55:51.627311 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:55:51.627318 systemd[1]: Starting modprobe@drm.service... Jul 10 00:55:51.627325 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:55:51.627332 systemd[1]: Starting modprobe@fuse.service... Jul 10 00:55:51.627340 systemd[1]: Starting modprobe@loop.service... Jul 10 00:55:51.627347 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 10 00:55:51.627354 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 10 00:55:51.627361 systemd[1]: Stopped systemd-fsck-root.service. Jul 10 00:55:51.627368 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 10 00:55:51.627376 systemd[1]: Stopped systemd-fsck-usr.service. Jul 10 00:55:51.627383 systemd[1]: Stopped systemd-journald.service. Jul 10 00:55:51.627390 systemd[1]: Starting systemd-journald.service... Jul 10 00:55:51.627396 systemd[1]: Starting systemd-modules-load.service... Jul 10 00:55:51.627405 systemd[1]: Starting systemd-network-generator.service... Jul 10 00:55:51.627412 systemd[1]: Starting systemd-remount-fs.service... Jul 10 00:55:51.627419 systemd[1]: Starting systemd-udev-trigger.service... Jul 10 00:55:51.627426 systemd[1]: verity-setup.service: Deactivated successfully. Jul 10 00:55:51.627433 systemd[1]: Stopped verity-setup.service. Jul 10 00:55:51.627440 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:55:51.627447 systemd[1]: Mounted dev-hugepages.mount. Jul 10 00:55:51.627454 kernel: fuse: init (API version 7.34) Jul 10 00:55:51.627460 systemd[1]: Mounted dev-mqueue.mount. Jul 10 00:55:51.627468 systemd[1]: Mounted media.mount. Jul 10 00:55:51.627475 systemd[1]: Mounted sys-kernel-debug.mount. Jul 10 00:55:51.627482 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 10 00:55:51.627492 systemd-journald[1008]: Journal started Jul 10 00:55:51.627525 systemd-journald[1008]: Runtime Journal (/run/log/journal/8554b7a082714631a41e33dc181d54c4) is 4.8M, max 38.8M, 34.0M free. Jul 10 00:55:48.819000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 10 00:55:48.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 10 00:55:48.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 10 00:55:48.948000 audit: BPF prog-id=10 op=LOAD Jul 10 00:55:48.948000 audit: BPF prog-id=10 op=UNLOAD Jul 10 00:55:48.948000 audit: BPF prog-id=11 op=LOAD Jul 10 00:55:48.948000 audit: BPF prog-id=11 op=UNLOAD Jul 10 00:55:49.032000 audit[920]: AVC avc: denied { associate } for pid=920 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 10 00:55:49.032000 audit[920]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d89c a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=903 pid=920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:55:49.032000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 10 00:55:49.033000 audit[920]: AVC avc: denied { associate } for pid=920 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 10 00:55:49.033000 audit[920]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d975 a2=1ed a3=0 items=2 ppid=903 pid=920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:55:49.033000 audit: CWD cwd="/" Jul 10 00:55:49.033000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:49.033000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:49.033000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 10 00:55:51.514000 audit: BPF prog-id=12 op=LOAD Jul 10 00:55:51.514000 audit: BPF prog-id=3 op=UNLOAD Jul 10 00:55:51.514000 audit: BPF prog-id=13 op=LOAD Jul 10 00:55:51.514000 audit: BPF prog-id=14 op=LOAD Jul 10 00:55:51.514000 audit: BPF prog-id=4 op=UNLOAD Jul 10 00:55:51.514000 audit: BPF prog-id=5 op=UNLOAD Jul 10 00:55:51.516000 audit: BPF prog-id=15 op=LOAD Jul 10 00:55:51.516000 audit: BPF prog-id=12 op=UNLOAD Jul 10 00:55:51.516000 audit: BPF prog-id=16 op=LOAD Jul 10 00:55:51.516000 audit: BPF prog-id=17 op=LOAD Jul 10 00:55:51.516000 audit: BPF prog-id=13 op=UNLOAD Jul 10 00:55:51.516000 audit: BPF prog-id=14 op=UNLOAD Jul 10 00:55:51.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.524000 audit: BPF prog-id=15 op=UNLOAD Jul 10 00:55:51.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.597000 audit: BPF prog-id=18 op=LOAD Jul 10 00:55:51.597000 audit: BPF prog-id=19 op=LOAD Jul 10 00:55:51.597000 audit: BPF prog-id=20 op=LOAD Jul 10 00:55:51.597000 audit: BPF prog-id=16 op=UNLOAD Jul 10 00:55:51.597000 audit: BPF prog-id=17 op=UNLOAD Jul 10 00:55:51.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.621000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 10 00:55:51.621000 audit[1008]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffc5fbed8f0 a2=4000 a3=7ffc5fbed98c items=0 ppid=1 pid=1008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:55:51.621000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 10 00:55:51.514498 systemd[1]: Queued start job for default target multi-user.target. Jul 10 00:55:49.032052 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-07-10T00:55:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 10 00:55:51.514508 systemd[1]: Unnecessary job was removed for dev-sda6.device. Jul 10 00:55:49.032492 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-07-10T00:55:49Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 10 00:55:51.518217 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 10 00:55:49.032504 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-07-10T00:55:49Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 10 00:55:49.032526 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-07-10T00:55:49Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 10 00:55:49.032531 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-07-10T00:55:49Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 10 00:55:49.032550 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-07-10T00:55:49Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 10 00:55:49.032557 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-07-10T00:55:49Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 10 00:55:49.032680 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-07-10T00:55:49Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 10 00:55:51.629881 jq[987]: true Jul 10 00:55:49.032704 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-07-10T00:55:49Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 10 00:55:49.032711 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-07-10T00:55:49Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 10 00:55:49.033501 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-07-10T00:55:49Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 10 00:55:49.033523 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-07-10T00:55:49Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 10 00:55:49.033534 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-07-10T00:55:49Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 Jul 10 00:55:49.033542 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-07-10T00:55:49Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 10 00:55:51.631388 systemd[1]: Started systemd-journald.service. Jul 10 00:55:51.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:49.033552 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-07-10T00:55:49Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 Jul 10 00:55:51.630669 systemd[1]: Mounted tmp.mount. Jul 10 00:55:49.033560 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-07-10T00:55:49Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 10 00:55:51.631268 systemd[1]: Finished kmod-static-nodes.service. Jul 10 00:55:51.242622 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-07-10T00:55:51Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 10 00:55:51.631496 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 10 00:55:51.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.242813 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-07-10T00:55:51Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 10 00:55:51.631573 systemd[1]: Finished modprobe@configfs.service. Jul 10 00:55:51.242933 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-07-10T00:55:51Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 10 00:55:51.631853 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:55:51.243075 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-07-10T00:55:51Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 10 00:55:51.631931 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:55:51.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.243108 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-07-10T00:55:51Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 10 00:55:51.632157 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 10 00:55:51.243150 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-07-10T00:55:51Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 10 00:55:51.632226 systemd[1]: Finished modprobe@drm.service. Jul 10 00:55:51.632699 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:55:51.632883 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:55:51.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.633277 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 10 00:55:51.633363 systemd[1]: Finished modprobe@fuse.service. Jul 10 00:55:51.633621 systemd[1]: Finished systemd-modules-load.service. Jul 10 00:55:51.634005 systemd[1]: Finished systemd-network-generator.service. Jul 10 00:55:51.634230 systemd[1]: Finished systemd-remount-fs.service. Jul 10 00:55:51.634574 systemd[1]: Reached target network-pre.target. Jul 10 00:55:51.635868 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 10 00:55:51.636792 systemd[1]: Mounting sys-kernel-config.mount... Jul 10 00:55:51.638278 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 10 00:55:51.640562 jq[1013]: true Jul 10 00:55:51.643741 kernel: loop: module loaded Jul 10 00:55:51.648268 systemd[1]: Starting systemd-hwdb-update.service... Jul 10 00:55:51.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.649061 systemd[1]: Starting systemd-journal-flush.service... Jul 10 00:55:51.649174 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:55:51.649830 systemd[1]: Starting systemd-random-seed.service... Jul 10 00:55:51.650539 systemd[1]: Starting systemd-sysctl.service... Jul 10 00:55:51.651604 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:55:51.651692 systemd[1]: Finished modprobe@loop.service. Jul 10 00:55:51.652251 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 10 00:55:51.652393 systemd[1]: Mounted sys-kernel-config.mount. Jul 10 00:55:51.652605 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:55:51.662848 systemd-journald[1008]: Time spent on flushing to /var/log/journal/8554b7a082714631a41e33dc181d54c4 is 44.259ms for 1996 entries. Jul 10 00:55:51.662848 systemd-journald[1008]: System Journal (/var/log/journal/8554b7a082714631a41e33dc181d54c4) is 8.0M, max 584.8M, 576.8M free. Jul 10 00:55:51.801135 systemd-journald[1008]: Received client request to flush runtime journal. Jul 10 00:55:51.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.666071 systemd[1]: Finished flatcar-tmpfiles.service. Jul 10 00:55:51.667025 systemd[1]: Starting systemd-sysusers.service... Jul 10 00:55:51.802316 udevadm[1046]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jul 10 00:55:51.710974 systemd[1]: Finished systemd-random-seed.service. Jul 10 00:55:51.711150 systemd[1]: Reached target first-boot-complete.target. Jul 10 00:55:51.720754 systemd[1]: Finished systemd-sysctl.service. Jul 10 00:55:51.771062 systemd[1]: Finished systemd-udev-trigger.service. Jul 10 00:55:51.772026 systemd[1]: Starting systemd-udev-settle.service... Jul 10 00:55:51.801640 systemd[1]: Finished systemd-journal-flush.service. Jul 10 00:55:51.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.833224 systemd[1]: Finished systemd-sysusers.service. Jul 10 00:55:51.956053 ignition[1037]: Ignition 2.14.0 Jul 10 00:55:51.956309 ignition[1037]: deleting config from guestinfo properties Jul 10 00:55:51.960954 ignition[1037]: Successfully deleted config Jul 10 00:55:51.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:51.961661 systemd[1]: Finished ignition-delete-config.service. Jul 10 00:55:52.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:52.195350 systemd[1]: Finished systemd-hwdb-update.service. Jul 10 00:55:52.194000 audit: BPF prog-id=21 op=LOAD Jul 10 00:55:52.194000 audit: BPF prog-id=22 op=LOAD Jul 10 00:55:52.194000 audit: BPF prog-id=7 op=UNLOAD Jul 10 00:55:52.194000 audit: BPF prog-id=8 op=UNLOAD Jul 10 00:55:52.196705 systemd[1]: Starting systemd-udevd.service... Jul 10 00:55:52.210807 systemd-udevd[1051]: Using default interface naming scheme 'v252'. Jul 10 00:55:52.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:52.248000 audit: BPF prog-id=23 op=LOAD Jul 10 00:55:52.249150 systemd[1]: Started systemd-udevd.service. Jul 10 00:55:52.250502 systemd[1]: Starting systemd-networkd.service... Jul 10 00:55:52.255000 audit: BPF prog-id=24 op=LOAD Jul 10 00:55:52.255000 audit: BPF prog-id=25 op=LOAD Jul 10 00:55:52.255000 audit: BPF prog-id=26 op=LOAD Jul 10 00:55:52.257627 systemd[1]: Starting systemd-userdbd.service... Jul 10 00:55:52.277492 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 10 00:55:52.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:52.298097 systemd[1]: Started systemd-userdbd.service. Jul 10 00:55:52.318748 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jul 10 00:55:52.323746 kernel: ACPI: button: Power Button [PWRF] Jul 10 00:55:52.355806 systemd-networkd[1059]: lo: Link UP Jul 10 00:55:52.355810 systemd-networkd[1059]: lo: Gained carrier Jul 10 00:55:52.356122 systemd-networkd[1059]: Enumeration completed Jul 10 00:55:52.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:52.356190 systemd[1]: Started systemd-networkd.service. Jul 10 00:55:52.356299 systemd-networkd[1059]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Jul 10 00:55:52.359135 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Jul 10 00:55:52.359302 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Jul 10 00:55:52.359397 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Jul 10 00:55:52.360498 systemd-networkd[1059]: ens192: Link UP Jul 10 00:55:52.360587 systemd-networkd[1059]: ens192: Gained carrier Jul 10 00:55:52.405000 audit[1053]: AVC avc: denied { confidentiality } for pid=1053 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 10 00:55:52.405000 audit[1053]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55895a8b7dc0 a1=338ac a2=7fc2ea2f8bc5 a3=5 items=110 ppid=1051 pid=1053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:55:52.405000 audit: CWD cwd="/" Jul 10 00:55:52.405000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=1 name=(null) inode=24713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=2 name=(null) inode=24713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=3 name=(null) inode=24714 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=4 name=(null) inode=24713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=5 name=(null) inode=24715 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=6 name=(null) inode=24713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=7 name=(null) inode=24716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=8 name=(null) inode=24716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=9 name=(null) inode=24717 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=10 name=(null) inode=24716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=11 name=(null) inode=24718 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=12 name=(null) inode=24716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=13 name=(null) inode=24719 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=14 name=(null) inode=24716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=15 name=(null) inode=24720 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=16 name=(null) inode=24716 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=17 name=(null) inode=24721 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=18 name=(null) inode=24713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=19 name=(null) inode=24722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=20 name=(null) inode=24722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=21 name=(null) inode=24723 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=22 name=(null) inode=24722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=23 name=(null) inode=24724 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=24 name=(null) inode=24722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=25 name=(null) inode=24725 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=26 name=(null) inode=24722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=27 name=(null) inode=24726 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=28 name=(null) inode=24722 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=29 name=(null) inode=24727 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=30 name=(null) inode=24713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=31 name=(null) inode=24728 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=32 name=(null) inode=24728 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=33 name=(null) inode=24729 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=34 name=(null) inode=24728 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=35 name=(null) inode=24730 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=36 name=(null) inode=24728 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=37 name=(null) inode=24731 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=38 name=(null) inode=24728 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=39 name=(null) inode=24732 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=40 name=(null) inode=24728 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=41 name=(null) inode=24733 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=42 name=(null) inode=24713 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=43 name=(null) inode=24734 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=44 name=(null) inode=24734 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=45 name=(null) inode=24735 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=46 name=(null) inode=24734 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=47 name=(null) inode=24736 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=48 name=(null) inode=24734 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=49 name=(null) inode=24737 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=50 name=(null) inode=24734 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=51 name=(null) inode=24738 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=52 name=(null) inode=24734 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=53 name=(null) inode=24739 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=55 name=(null) inode=24740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=56 name=(null) inode=24740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=57 name=(null) inode=24741 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=58 name=(null) inode=24740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=59 name=(null) inode=24742 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=60 name=(null) inode=24740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=61 name=(null) inode=24743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=62 name=(null) inode=24743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=63 name=(null) inode=24744 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=64 name=(null) inode=24743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=65 name=(null) inode=24745 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=66 name=(null) inode=24743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=67 name=(null) inode=24746 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=68 name=(null) inode=24743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=69 name=(null) inode=24747 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=70 name=(null) inode=24743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=71 name=(null) inode=24748 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=72 name=(null) inode=24740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=73 name=(null) inode=24749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=74 name=(null) inode=24749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=75 name=(null) inode=24750 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=76 name=(null) inode=24749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=77 name=(null) inode=24751 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=78 name=(null) inode=24749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=79 name=(null) inode=24752 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=80 name=(null) inode=24749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=81 name=(null) inode=24753 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=82 name=(null) inode=24749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=83 name=(null) inode=24754 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=84 name=(null) inode=24740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=85 name=(null) inode=24755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=86 name=(null) inode=24755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=87 name=(null) inode=24756 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=88 name=(null) inode=24755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=89 name=(null) inode=24757 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=90 name=(null) inode=24755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=91 name=(null) inode=24758 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=92 name=(null) inode=24755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=93 name=(null) inode=24759 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=94 name=(null) inode=24755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=95 name=(null) inode=24760 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=96 name=(null) inode=24740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=97 name=(null) inode=24761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=98 name=(null) inode=24761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=99 name=(null) inode=24762 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=100 name=(null) inode=24761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=101 name=(null) inode=24763 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=102 name=(null) inode=24761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=103 name=(null) inode=24764 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=104 name=(null) inode=24761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=105 name=(null) inode=24765 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=106 name=(null) inode=24761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=107 name=(null) inode=24766 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PATH item=109 name=(null) inode=24767 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:55:52.405000 audit: PROCTITLE proctitle="(udev-worker)" Jul 10 00:55:52.422744 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Jul 10 00:55:52.434973 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Jul 10 00:55:52.435325 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Jul 10 00:55:52.435404 kernel: Guest personality initialized and is active Jul 10 00:55:52.436785 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Jul 10 00:55:52.436809 kernel: Initialized host personality Jul 10 00:55:52.444946 (udev-worker)[1053]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Jul 10 00:55:52.450749 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Jul 10 00:55:52.458753 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 10 00:55:52.459749 kernel: mousedev: PS/2 mouse device common for all mice Jul 10 00:55:52.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:52.470005 systemd[1]: Finished systemd-udev-settle.service. Jul 10 00:55:52.471014 systemd[1]: Starting lvm2-activation-early.service... Jul 10 00:55:52.488022 lvm[1084]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 10 00:55:52.510300 systemd[1]: Finished lvm2-activation-early.service. Jul 10 00:55:52.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:52.510498 systemd[1]: Reached target cryptsetup.target. Jul 10 00:55:52.511448 systemd[1]: Starting lvm2-activation.service... Jul 10 00:55:52.514000 lvm[1085]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 10 00:55:52.531287 systemd[1]: Finished lvm2-activation.service. Jul 10 00:55:52.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:52.531485 systemd[1]: Reached target local-fs-pre.target. Jul 10 00:55:52.531587 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 10 00:55:52.531604 systemd[1]: Reached target local-fs.target. Jul 10 00:55:52.531868 systemd[1]: Reached target machines.target. Jul 10 00:55:52.532904 systemd[1]: Starting ldconfig.service... Jul 10 00:55:52.533502 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:55:52.533546 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:55:52.534343 systemd[1]: Starting systemd-boot-update.service... Jul 10 00:55:52.535047 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 10 00:55:52.535988 systemd[1]: Starting systemd-machine-id-commit.service... Jul 10 00:55:52.536851 systemd[1]: Starting systemd-sysext.service... Jul 10 00:55:52.544429 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 10 00:55:52.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:52.547477 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1087 (bootctl) Jul 10 00:55:52.548247 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 10 00:55:52.554137 systemd[1]: Unmounting usr-share-oem.mount... Jul 10 00:55:52.566065 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 10 00:55:52.566180 systemd[1]: Unmounted usr-share-oem.mount. Jul 10 00:55:52.587751 kernel: loop0: detected capacity change from 0 to 224512 Jul 10 00:55:52.638250 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 10 00:55:52.639013 systemd[1]: Finished systemd-machine-id-commit.service. Jul 10 00:55:52.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:52.754753 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 10 00:55:52.772426 systemd-fsck[1096]: fsck.fat 4.2 (2021-01-31) Jul 10 00:55:52.772426 systemd-fsck[1096]: /dev/sda1: 790 files, 120731/258078 clusters Jul 10 00:55:52.773570 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 10 00:55:52.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:52.774616 systemd[1]: Mounting boot.mount... Jul 10 00:55:52.779750 kernel: loop1: detected capacity change from 0 to 224512 Jul 10 00:55:52.808144 systemd[1]: Mounted boot.mount. Jul 10 00:55:52.824270 systemd[1]: Finished systemd-boot-update.service. Jul 10 00:55:52.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:52.834772 (sd-sysext)[1100]: Using extensions 'kubernetes'. Jul 10 00:55:52.835708 (sd-sysext)[1100]: Merged extensions into '/usr'. Jul 10 00:55:52.847191 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:55:52.848396 systemd[1]: Mounting usr-share-oem.mount... Jul 10 00:55:52.849375 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:55:52.851685 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:55:52.852551 systemd[1]: Starting modprobe@loop.service... Jul 10 00:55:52.852702 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:55:52.852796 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:55:52.852885 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:55:52.855348 systemd[1]: Mounted usr-share-oem.mount. Jul 10 00:55:52.855627 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:55:52.855778 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:55:52.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:52.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:52.856096 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:55:52.856174 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:55:52.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:52.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:52.856485 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:55:52.856548 systemd[1]: Finished modprobe@loop.service. Jul 10 00:55:52.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:52.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:52.856977 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:55:52.857057 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:55:52.857577 systemd[1]: Finished systemd-sysext.service. Jul 10 00:55:52.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:52.858523 systemd[1]: Starting ensure-sysext.service... Jul 10 00:55:52.859573 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 10 00:55:52.866599 systemd[1]: Reloading. Jul 10 00:55:52.874320 systemd-tmpfiles[1108]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 10 00:55:52.879494 systemd-tmpfiles[1108]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 10 00:55:52.892435 systemd-tmpfiles[1108]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 10 00:55:52.906661 /usr/lib/systemd/system-generators/torcx-generator[1128]: time="2025-07-10T00:55:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 10 00:55:52.906686 /usr/lib/systemd/system-generators/torcx-generator[1128]: time="2025-07-10T00:55:52Z" level=info msg="torcx already run" Jul 10 00:55:52.973766 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 10 00:55:52.973779 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 10 00:55:52.986093 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 10 00:55:53.019000 audit: BPF prog-id=27 op=LOAD Jul 10 00:55:53.019000 audit: BPF prog-id=24 op=UNLOAD Jul 10 00:55:53.019000 audit: BPF prog-id=28 op=LOAD Jul 10 00:55:53.019000 audit: BPF prog-id=29 op=LOAD Jul 10 00:55:53.019000 audit: BPF prog-id=25 op=UNLOAD Jul 10 00:55:53.019000 audit: BPF prog-id=26 op=UNLOAD Jul 10 00:55:53.019000 audit: BPF prog-id=30 op=LOAD Jul 10 00:55:53.019000 audit: BPF prog-id=18 op=UNLOAD Jul 10 00:55:53.019000 audit: BPF prog-id=31 op=LOAD Jul 10 00:55:53.019000 audit: BPF prog-id=32 op=LOAD Jul 10 00:55:53.019000 audit: BPF prog-id=19 op=UNLOAD Jul 10 00:55:53.019000 audit: BPF prog-id=20 op=UNLOAD Jul 10 00:55:53.020000 audit: BPF prog-id=33 op=LOAD Jul 10 00:55:53.020000 audit: BPF prog-id=23 op=UNLOAD Jul 10 00:55:53.021000 audit: BPF prog-id=34 op=LOAD Jul 10 00:55:53.021000 audit: BPF prog-id=35 op=LOAD Jul 10 00:55:53.021000 audit: BPF prog-id=21 op=UNLOAD Jul 10 00:55:53.021000 audit: BPF prog-id=22 op=UNLOAD Jul 10 00:55:53.029862 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:55:53.030684 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:55:53.032047 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:55:53.033005 systemd[1]: Starting modprobe@loop.service... Jul 10 00:55:53.033222 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:55:53.033291 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:55:53.033357 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:55:53.033844 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:55:53.033930 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:55:53.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.034251 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:55:53.034321 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:55:53.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.034628 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:55:53.034692 systemd[1]: Finished modprobe@loop.service. Jul 10 00:55:53.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.035004 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:55:53.035064 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:55:53.035924 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:55:53.036630 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:55:53.037679 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:55:53.038906 systemd[1]: Starting modprobe@loop.service... Jul 10 00:55:53.039376 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:55:53.039452 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:55:53.039516 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:55:53.039998 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:55:53.040071 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:55:53.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.040378 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:55:53.040446 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:55:53.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.040796 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:55:53.040872 systemd[1]: Finished modprobe@loop.service. Jul 10 00:55:53.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.041172 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:55:53.041232 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:55:53.042852 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:55:53.043553 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:55:53.044244 systemd[1]: Starting modprobe@drm.service... Jul 10 00:55:53.045337 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:55:53.046381 systemd[1]: Starting modprobe@loop.service... Jul 10 00:55:53.046913 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:55:53.047027 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:55:53.047838 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 10 00:55:53.048061 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:55:53.048688 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:55:53.048831 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:55:53.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.049161 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 10 00:55:53.049244 systemd[1]: Finished modprobe@drm.service. Jul 10 00:55:53.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.049554 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:55:53.049631 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:55:53.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.049976 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:55:53.050046 systemd[1]: Finished modprobe@loop.service. Jul 10 00:55:53.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.050423 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:55:53.050482 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:55:53.051200 systemd[1]: Finished ensure-sysext.service. Jul 10 00:55:53.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.340978 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 10 00:55:53.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.342104 kernel: kauditd_printk_skb: 280 callbacks suppressed Jul 10 00:55:53.342139 kernel: audit: type=1130 audit(1752108953.339:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.345768 systemd[1]: Starting audit-rules.service... Jul 10 00:55:53.347057 systemd[1]: Starting clean-ca-certificates.service... Jul 10 00:55:53.348263 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 10 00:55:53.347000 audit: BPF prog-id=36 op=LOAD Jul 10 00:55:53.351457 kernel: audit: type=1334 audit(1752108953.347:204): prog-id=36 op=LOAD Jul 10 00:55:53.350043 systemd[1]: Starting systemd-resolved.service... Jul 10 00:55:53.350000 audit: BPF prog-id=37 op=LOAD Jul 10 00:55:53.354775 kernel: audit: type=1334 audit(1752108953.350:205): prog-id=37 op=LOAD Jul 10 00:55:53.353251 systemd[1]: Starting systemd-timesyncd.service... Jul 10 00:55:53.355996 systemd[1]: Starting systemd-update-utmp.service... Jul 10 00:55:53.360000 audit[1205]: SYSTEM_BOOT pid=1205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.366122 kernel: audit: type=1127 audit(1752108953.360:206): pid=1205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.366157 kernel: audit: type=1130 audit(1752108953.364:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.365971 systemd[1]: Finished systemd-update-utmp.service. Jul 10 00:55:53.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.371870 systemd[1]: Finished clean-ca-certificates.service. Jul 10 00:55:53.372039 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 10 00:55:53.374871 kernel: audit: type=1130 audit(1752108953.370:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.420793 systemd[1]: Started systemd-timesyncd.service. Jul 10 00:55:53.421020 systemd[1]: Reached target time-set.target. Jul 10 00:55:53.423753 kernel: audit: type=1130 audit(1752108953.419:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.427218 systemd-resolved[1203]: Positive Trust Anchors: Jul 10 00:55:53.427382 systemd-resolved[1203]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 10 00:55:53.427441 systemd-resolved[1203]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 10 00:55:53.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.434864 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 10 00:55:53.438820 kernel: audit: type=1130 audit(1752108953.433:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:55:53.445580 augenrules[1221]: No rules Jul 10 00:55:53.443000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 10 00:55:53.446004 systemd[1]: Finished audit-rules.service. Jul 10 00:55:53.451748 kernel: audit: type=1305 audit(1752108953.443:211): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 10 00:55:53.451795 kernel: audit: type=1300 audit(1752108953.443:211): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd504b6270 a2=420 a3=0 items=0 ppid=1200 pid=1221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:55:53.443000 audit[1221]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd504b6270 a2=420 a3=0 items=0 ppid=1200 pid=1221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:55:53.443000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 10 00:55:53.458391 systemd-resolved[1203]: Defaulting to hostname 'linux'. Jul 10 00:55:53.459661 systemd[1]: Started systemd-resolved.service. Jul 10 00:55:53.459886 systemd[1]: Reached target network.target. Jul 10 00:55:53.460011 systemd[1]: Reached target nss-lookup.target. Jul 10 00:57:20.314144 systemd-resolved[1203]: Clock change detected. Flushing caches. Jul 10 00:57:20.314608 systemd-timesyncd[1204]: Contacted time server 50.205.57.38:123 (0.flatcar.pool.ntp.org). Jul 10 00:57:20.314860 systemd-timesyncd[1204]: Initial clock synchronization to Thu 2025-07-10 00:57:20.314078 UTC. Jul 10 00:57:20.415825 ldconfig[1086]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 10 00:57:20.431340 systemd[1]: Finished ldconfig.service. Jul 10 00:57:20.432406 systemd[1]: Starting systemd-update-done.service... Jul 10 00:57:20.436690 systemd[1]: Finished systemd-update-done.service. Jul 10 00:57:20.436866 systemd[1]: Reached target sysinit.target. Jul 10 00:57:20.437029 systemd[1]: Started motdgen.path. Jul 10 00:57:20.437182 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 10 00:57:20.437399 systemd[1]: Started logrotate.timer. Jul 10 00:57:20.437542 systemd[1]: Started mdadm.timer. Jul 10 00:57:20.437633 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 10 00:57:20.437731 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 10 00:57:20.437756 systemd[1]: Reached target paths.target. Jul 10 00:57:20.437842 systemd[1]: Reached target timers.target. Jul 10 00:57:20.438098 systemd[1]: Listening on dbus.socket. Jul 10 00:57:20.438934 systemd[1]: Starting docker.socket... Jul 10 00:57:20.440924 systemd[1]: Listening on sshd.socket. Jul 10 00:57:20.441080 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:57:20.441324 systemd[1]: Listening on docker.socket. Jul 10 00:57:20.441622 systemd[1]: Reached target sockets.target. Jul 10 00:57:20.441713 systemd[1]: Reached target basic.target. Jul 10 00:57:20.441832 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 10 00:57:20.441863 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 10 00:57:20.442573 systemd[1]: Starting containerd.service... Jul 10 00:57:20.443423 systemd[1]: Starting dbus.service... Jul 10 00:57:20.444628 systemd[1]: Starting enable-oem-cloudinit.service... Jul 10 00:57:20.445761 systemd[1]: Starting extend-filesystems.service... Jul 10 00:57:20.448539 jq[1231]: false Jul 10 00:57:20.446292 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 10 00:57:20.448864 systemd[1]: Starting motdgen.service... Jul 10 00:57:20.449937 systemd[1]: Starting prepare-helm.service... Jul 10 00:57:20.450740 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 10 00:57:20.451687 systemd[1]: Starting sshd-keygen.service... Jul 10 00:57:20.455503 systemd[1]: Starting systemd-logind.service... Jul 10 00:57:20.455627 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:57:20.455677 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 10 00:57:20.456124 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 10 00:57:20.456535 systemd[1]: Starting update-engine.service... Jul 10 00:57:20.457501 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 10 00:57:20.458472 systemd[1]: Starting vmtoolsd.service... Jul 10 00:57:20.459489 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 10 00:57:20.459819 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 10 00:57:20.460673 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 10 00:57:20.461421 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 10 00:57:20.469855 systemd[1]: Started vmtoolsd.service. Jul 10 00:57:20.472425 tar[1247]: linux-amd64/LICENSE Jul 10 00:57:20.472425 tar[1247]: linux-amd64/helm Jul 10 00:57:20.472598 jq[1243]: true Jul 10 00:57:20.483027 jq[1251]: true Jul 10 00:57:20.494203 extend-filesystems[1232]: Found loop1 Jul 10 00:57:20.498220 extend-filesystems[1232]: Found sda Jul 10 00:57:20.498596 systemd[1]: motdgen.service: Deactivated successfully. Jul 10 00:57:20.498704 systemd[1]: Finished motdgen.service. Jul 10 00:57:20.498988 extend-filesystems[1232]: Found sda1 Jul 10 00:57:20.499140 extend-filesystems[1232]: Found sda2 Jul 10 00:57:20.499286 extend-filesystems[1232]: Found sda3 Jul 10 00:57:20.499442 extend-filesystems[1232]: Found usr Jul 10 00:57:20.499582 extend-filesystems[1232]: Found sda4 Jul 10 00:57:20.499727 extend-filesystems[1232]: Found sda6 Jul 10 00:57:20.499865 extend-filesystems[1232]: Found sda7 Jul 10 00:57:20.500010 extend-filesystems[1232]: Found sda9 Jul 10 00:57:20.500143 extend-filesystems[1232]: Checking size of /dev/sda9 Jul 10 00:57:20.518893 env[1248]: time="2025-07-10T00:57:20.518866081Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 10 00:57:20.531003 extend-filesystems[1232]: Old size kept for /dev/sda9 Jul 10 00:57:20.534658 extend-filesystems[1232]: Found sr0 Jul 10 00:57:20.535075 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 10 00:57:20.535174 systemd[1]: Finished extend-filesystems.service. Jul 10 00:57:20.557534 env[1248]: time="2025-07-10T00:57:20.557509923Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 10 00:57:20.557697 env[1248]: time="2025-07-10T00:57:20.557686140Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:57:20.562231 systemd-logind[1239]: Watching system buttons on /dev/input/event1 (Power Button) Jul 10 00:57:20.562244 systemd-logind[1239]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 10 00:57:20.562627 systemd-logind[1239]: New seat seat0. Jul 10 00:57:20.563742 env[1248]: time="2025-07-10T00:57:20.563720045Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.186-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 10 00:57:20.563801 env[1248]: time="2025-07-10T00:57:20.563789562Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:57:20.563968 env[1248]: time="2025-07-10T00:57:20.563955541Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 10 00:57:20.564024 env[1248]: time="2025-07-10T00:57:20.564014338Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 10 00:57:20.564072 env[1248]: time="2025-07-10T00:57:20.564060521Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 10 00:57:20.564126 env[1248]: time="2025-07-10T00:57:20.564116254Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 10 00:57:20.564219 env[1248]: time="2025-07-10T00:57:20.564210421Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:57:20.564430 env[1248]: time="2025-07-10T00:57:20.564420523Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:57:20.564549 env[1248]: time="2025-07-10T00:57:20.564538031Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 10 00:57:20.564605 env[1248]: time="2025-07-10T00:57:20.564596083Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 10 00:57:20.568887 env[1248]: time="2025-07-10T00:57:20.568872313Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 10 00:57:20.568953 env[1248]: time="2025-07-10T00:57:20.568942277Z" level=info msg="metadata content store policy set" policy=shared Jul 10 00:57:20.590567 env[1248]: time="2025-07-10T00:57:20.590453257Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 10 00:57:20.590567 env[1248]: time="2025-07-10T00:57:20.590487947Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 10 00:57:20.590567 env[1248]: time="2025-07-10T00:57:20.590516845Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 10 00:57:20.592017 env[1248]: time="2025-07-10T00:57:20.590538898Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 10 00:57:20.592017 env[1248]: time="2025-07-10T00:57:20.590720762Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 10 00:57:20.592017 env[1248]: time="2025-07-10T00:57:20.590731028Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 10 00:57:20.592017 env[1248]: time="2025-07-10T00:57:20.590738395Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 10 00:57:20.592017 env[1248]: time="2025-07-10T00:57:20.590746068Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 10 00:57:20.592017 env[1248]: time="2025-07-10T00:57:20.590753164Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 10 00:57:20.592017 env[1248]: time="2025-07-10T00:57:20.590769105Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 10 00:57:20.592017 env[1248]: time="2025-07-10T00:57:20.590778364Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 10 00:57:20.592017 env[1248]: time="2025-07-10T00:57:20.590786367Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 10 00:57:20.592017 env[1248]: time="2025-07-10T00:57:20.590845671Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 10 00:57:20.592017 env[1248]: time="2025-07-10T00:57:20.590897758Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 10 00:57:20.592017 env[1248]: time="2025-07-10T00:57:20.591044471Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 10 00:57:20.592017 env[1248]: time="2025-07-10T00:57:20.591063383Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 10 00:57:20.592017 env[1248]: time="2025-07-10T00:57:20.591071732Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 10 00:57:20.596906 env[1248]: time="2025-07-10T00:57:20.591096077Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 10 00:57:20.596906 env[1248]: time="2025-07-10T00:57:20.591107221Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 10 00:57:20.596906 env[1248]: time="2025-07-10T00:57:20.591114765Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 10 00:57:20.596906 env[1248]: time="2025-07-10T00:57:20.591121286Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 10 00:57:20.596906 env[1248]: time="2025-07-10T00:57:20.591128022Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 10 00:57:20.596906 env[1248]: time="2025-07-10T00:57:20.591134982Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 10 00:57:20.596906 env[1248]: time="2025-07-10T00:57:20.591141114Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 10 00:57:20.596906 env[1248]: time="2025-07-10T00:57:20.591147004Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 10 00:57:20.596906 env[1248]: time="2025-07-10T00:57:20.591154335Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 10 00:57:20.596906 env[1248]: time="2025-07-10T00:57:20.591252923Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 10 00:57:20.596906 env[1248]: time="2025-07-10T00:57:20.591263739Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 10 00:57:20.596906 env[1248]: time="2025-07-10T00:57:20.591272126Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 10 00:57:20.596906 env[1248]: time="2025-07-10T00:57:20.591283206Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 10 00:57:20.596906 env[1248]: time="2025-07-10T00:57:20.591308673Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 10 00:57:20.597137 bash[1280]: Updated "/home/core/.ssh/authorized_keys" Jul 10 00:57:20.592209 dbus-daemon[1230]: [system] SELinux support is enabled Jul 10 00:57:20.598417 kernel: NET: Registered PF_VSOCK protocol family Jul 10 00:57:20.592310 systemd[1]: Started dbus.service. Jul 10 00:57:20.598498 env[1248]: time="2025-07-10T00:57:20.591326698Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 10 00:57:20.598498 env[1248]: time="2025-07-10T00:57:20.591361676Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 10 00:57:20.598498 env[1248]: time="2025-07-10T00:57:20.591391319Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 10 00:57:20.593637 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 10 00:57:20.598662 env[1248]: time="2025-07-10T00:57:20.591531728Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 10 00:57:20.598662 env[1248]: time="2025-07-10T00:57:20.591565678Z" level=info msg="Connect containerd service" Jul 10 00:57:20.598662 env[1248]: time="2025-07-10T00:57:20.591600369Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 10 00:57:20.593652 systemd[1]: Reached target system-config.target. Jul 10 00:57:20.606540 env[1248]: time="2025-07-10T00:57:20.601760911Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 10 00:57:20.606540 env[1248]: time="2025-07-10T00:57:20.601842918Z" level=info msg="Start subscribing containerd event" Jul 10 00:57:20.606540 env[1248]: time="2025-07-10T00:57:20.601871590Z" level=info msg="Start recovering state" Jul 10 00:57:20.606540 env[1248]: time="2025-07-10T00:57:20.601919895Z" level=info msg="Start event monitor" Jul 10 00:57:20.606540 env[1248]: time="2025-07-10T00:57:20.601933596Z" level=info msg="Start snapshots syncer" Jul 10 00:57:20.606540 env[1248]: time="2025-07-10T00:57:20.601938914Z" level=info msg="Start cni network conf syncer for default" Jul 10 00:57:20.606540 env[1248]: time="2025-07-10T00:57:20.601943185Z" level=info msg="Start streaming server" Jul 10 00:57:20.606540 env[1248]: time="2025-07-10T00:57:20.602167086Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 10 00:57:20.606540 env[1248]: time="2025-07-10T00:57:20.602193349Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 10 00:57:20.593768 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 10 00:57:20.593778 systemd[1]: Reached target user-config.target. Jul 10 00:57:20.595519 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 10 00:57:20.597975 systemd[1]: Started systemd-logind.service. Jul 10 00:57:20.602304 systemd[1]: Started containerd.service. Jul 10 00:57:20.610733 update_engine[1241]: I0710 00:57:20.610037 1241 main.cc:92] Flatcar Update Engine starting Jul 10 00:57:20.612709 systemd[1]: Started update-engine.service. Jul 10 00:57:20.613470 update_engine[1241]: I0710 00:57:20.613412 1241 update_check_scheduler.cc:74] Next update check in 4m0s Jul 10 00:57:20.614156 systemd[1]: Started locksmithd.service. Jul 10 00:57:20.616320 env[1248]: time="2025-07-10T00:57:20.616297555Z" level=info msg="containerd successfully booted in 0.098992s" Jul 10 00:57:20.728559 systemd-networkd[1059]: ens192: Gained IPv6LL Jul 10 00:57:20.730435 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 10 00:57:20.730770 systemd[1]: Reached target network-online.target. Jul 10 00:57:20.735117 systemd[1]: Starting kubelet.service... Jul 10 00:57:20.932224 sshd_keygen[1258]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 10 00:57:20.942325 tar[1247]: linux-amd64/README.md Jul 10 00:57:20.945400 systemd[1]: Finished prepare-helm.service. Jul 10 00:57:20.949510 systemd[1]: Finished sshd-keygen.service. Jul 10 00:57:20.950592 systemd[1]: Starting issuegen.service... Jul 10 00:57:20.954082 systemd[1]: issuegen.service: Deactivated successfully. Jul 10 00:57:20.954168 systemd[1]: Finished issuegen.service. Jul 10 00:57:20.955471 systemd[1]: Starting systemd-user-sessions.service... Jul 10 00:57:20.960733 systemd[1]: Finished systemd-user-sessions.service. Jul 10 00:57:20.961697 systemd[1]: Started getty@tty1.service. Jul 10 00:57:20.962609 systemd[1]: Started serial-getty@ttyS0.service. Jul 10 00:57:20.962814 systemd[1]: Reached target getty.target. Jul 10 00:57:21.045067 locksmithd[1293]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 10 00:57:23.268650 systemd[1]: Started kubelet.service. Jul 10 00:57:23.268982 systemd[1]: Reached target multi-user.target. Jul 10 00:57:23.269995 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 10 00:57:23.275632 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 10 00:57:23.275739 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 10 00:57:23.275932 systemd[1]: Startup finished in 891ms (kernel) + 5.070s (initrd) + 7.912s (userspace) = 13.874s. Jul 10 00:57:23.303385 login[1359]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jul 10 00:57:23.303501 login[1358]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jul 10 00:57:23.335305 systemd[1]: Created slice user-500.slice. Jul 10 00:57:23.336199 systemd[1]: Starting user-runtime-dir@500.service... Jul 10 00:57:23.337728 systemd-logind[1239]: New session 1 of user core. Jul 10 00:57:23.339561 systemd-logind[1239]: New session 2 of user core. Jul 10 00:57:23.351353 systemd[1]: Finished user-runtime-dir@500.service. Jul 10 00:57:23.352496 systemd[1]: Starting user@500.service... Jul 10 00:57:23.363524 (systemd)[1366]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:57:23.458678 systemd[1366]: Queued start job for default target default.target. Jul 10 00:57:23.459440 systemd[1366]: Reached target paths.target. Jul 10 00:57:23.459524 systemd[1366]: Reached target sockets.target. Jul 10 00:57:23.459586 systemd[1366]: Reached target timers.target. Jul 10 00:57:23.459642 systemd[1366]: Reached target basic.target. Jul 10 00:57:23.459752 systemd[1]: Started user@500.service. Jul 10 00:57:23.460584 systemd[1]: Started session-1.scope. Jul 10 00:57:23.460832 systemd[1366]: Reached target default.target. Jul 10 00:57:23.460858 systemd[1366]: Startup finished in 93ms. Jul 10 00:57:23.461073 systemd[1]: Started session-2.scope. Jul 10 00:57:24.218871 kubelet[1363]: E0710 00:57:24.218831 1363 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 10 00:57:24.220100 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 10 00:57:24.220176 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 10 00:57:34.354217 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 10 00:57:34.354409 systemd[1]: Stopped kubelet.service. Jul 10 00:57:34.355419 systemd[1]: Starting kubelet.service... Jul 10 00:57:34.683966 systemd[1]: Started kubelet.service. Jul 10 00:57:34.726709 kubelet[1395]: E0710 00:57:34.726675 1395 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 10 00:57:34.728768 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 10 00:57:34.728842 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 10 00:57:44.854248 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Jul 10 00:57:44.854439 systemd[1]: Stopped kubelet.service. Jul 10 00:57:44.855731 systemd[1]: Starting kubelet.service... Jul 10 00:57:45.282279 systemd[1]: Started kubelet.service. Jul 10 00:57:45.352945 kubelet[1404]: E0710 00:57:45.352915 1404 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 10 00:57:45.354420 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 10 00:57:45.354522 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 10 00:57:50.663047 systemd[1]: Created slice system-sshd.slice. Jul 10 00:57:50.663859 systemd[1]: Started sshd@0-139.178.70.109:22-139.178.68.195:45290.service. Jul 10 00:57:50.701855 sshd[1410]: Accepted publickey for core from 139.178.68.195 port 45290 ssh2: RSA SHA256:NVpdRDPpwzjVTzi6orhe1cA9BvcYymCSReGH8myOy/Q Jul 10 00:57:50.702599 sshd[1410]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:57:50.705686 systemd[1]: Started session-3.scope. Jul 10 00:57:50.705957 systemd-logind[1239]: New session 3 of user core. Jul 10 00:57:50.753312 systemd[1]: Started sshd@1-139.178.70.109:22-139.178.68.195:45292.service. Jul 10 00:57:50.782191 sshd[1415]: Accepted publickey for core from 139.178.68.195 port 45292 ssh2: RSA SHA256:NVpdRDPpwzjVTzi6orhe1cA9BvcYymCSReGH8myOy/Q Jul 10 00:57:50.783131 sshd[1415]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:57:50.786168 systemd[1]: Started session-4.scope. Jul 10 00:57:50.786444 systemd-logind[1239]: New session 4 of user core. Jul 10 00:57:50.835379 sshd[1415]: pam_unix(sshd:session): session closed for user core Jul 10 00:57:50.837184 systemd[1]: Started sshd@2-139.178.70.109:22-139.178.68.195:45298.service. Jul 10 00:57:50.838749 systemd-logind[1239]: Session 4 logged out. Waiting for processes to exit. Jul 10 00:57:50.838860 systemd[1]: sshd@1-139.178.70.109:22-139.178.68.195:45292.service: Deactivated successfully. Jul 10 00:57:50.839215 systemd[1]: session-4.scope: Deactivated successfully. Jul 10 00:57:50.840608 systemd-logind[1239]: Removed session 4. Jul 10 00:57:50.864223 sshd[1420]: Accepted publickey for core from 139.178.68.195 port 45298 ssh2: RSA SHA256:NVpdRDPpwzjVTzi6orhe1cA9BvcYymCSReGH8myOy/Q Jul 10 00:57:50.865180 sshd[1420]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:57:50.867977 systemd[1]: Started session-5.scope. Jul 10 00:57:50.868327 systemd-logind[1239]: New session 5 of user core. Jul 10 00:57:50.914582 sshd[1420]: pam_unix(sshd:session): session closed for user core Jul 10 00:57:50.916603 systemd[1]: sshd@2-139.178.70.109:22-139.178.68.195:45298.service: Deactivated successfully. Jul 10 00:57:50.916940 systemd[1]: session-5.scope: Deactivated successfully. Jul 10 00:57:50.917273 systemd-logind[1239]: Session 5 logged out. Waiting for processes to exit. Jul 10 00:57:50.917861 systemd[1]: Started sshd@3-139.178.70.109:22-139.178.68.195:45310.service. Jul 10 00:57:50.918398 systemd-logind[1239]: Removed session 5. Jul 10 00:57:50.944635 sshd[1427]: Accepted publickey for core from 139.178.68.195 port 45310 ssh2: RSA SHA256:NVpdRDPpwzjVTzi6orhe1cA9BvcYymCSReGH8myOy/Q Jul 10 00:57:50.945337 sshd[1427]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:57:50.947804 systemd-logind[1239]: New session 6 of user core. Jul 10 00:57:50.948299 systemd[1]: Started session-6.scope. Jul 10 00:57:50.998225 sshd[1427]: pam_unix(sshd:session): session closed for user core Jul 10 00:57:51.000129 systemd[1]: sshd@3-139.178.70.109:22-139.178.68.195:45310.service: Deactivated successfully. Jul 10 00:57:51.000463 systemd[1]: session-6.scope: Deactivated successfully. Jul 10 00:57:51.000811 systemd-logind[1239]: Session 6 logged out. Waiting for processes to exit. Jul 10 00:57:51.001404 systemd[1]: Started sshd@4-139.178.70.109:22-139.178.68.195:45320.service. Jul 10 00:57:51.001956 systemd-logind[1239]: Removed session 6. Jul 10 00:57:51.028200 sshd[1433]: Accepted publickey for core from 139.178.68.195 port 45320 ssh2: RSA SHA256:NVpdRDPpwzjVTzi6orhe1cA9BvcYymCSReGH8myOy/Q Jul 10 00:57:51.028920 sshd[1433]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:57:51.031384 systemd-logind[1239]: New session 7 of user core. Jul 10 00:57:51.031830 systemd[1]: Started session-7.scope. Jul 10 00:57:51.088773 sudo[1436]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 10 00:57:51.088905 sudo[1436]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:57:51.095340 dbus-daemon[1230]: \xd0\xfd\xf1\u0002\xc8U: received setenforce notice (enforcing=-693274880) Jul 10 00:57:51.095430 sudo[1436]: pam_unix(sudo:session): session closed for user root Jul 10 00:57:51.097483 sshd[1433]: pam_unix(sshd:session): session closed for user core Jul 10 00:57:51.099359 systemd[1]: Started sshd@5-139.178.70.109:22-139.178.68.195:45332.service. Jul 10 00:57:51.099649 systemd[1]: sshd@4-139.178.70.109:22-139.178.68.195:45320.service: Deactivated successfully. Jul 10 00:57:51.100015 systemd[1]: session-7.scope: Deactivated successfully. Jul 10 00:57:51.100448 systemd-logind[1239]: Session 7 logged out. Waiting for processes to exit. Jul 10 00:57:51.102672 systemd-logind[1239]: Removed session 7. Jul 10 00:57:51.126465 sshd[1439]: Accepted publickey for core from 139.178.68.195 port 45332 ssh2: RSA SHA256:NVpdRDPpwzjVTzi6orhe1cA9BvcYymCSReGH8myOy/Q Jul 10 00:57:51.127401 sshd[1439]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:57:51.130252 systemd[1]: Started session-8.scope. Jul 10 00:57:51.130571 systemd-logind[1239]: New session 8 of user core. Jul 10 00:57:51.179521 sudo[1444]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 10 00:57:51.180660 sudo[1444]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:57:51.182420 sudo[1444]: pam_unix(sudo:session): session closed for user root Jul 10 00:57:51.185122 sudo[1443]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 10 00:57:51.185249 sudo[1443]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:57:51.190516 systemd[1]: Stopping audit-rules.service... Jul 10 00:57:51.190000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 10 00:57:51.194845 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 10 00:57:51.194878 kernel: audit: type=1305 audit(1752109071.190:212): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 10 00:57:51.196558 auditctl[1447]: No rules Jul 10 00:57:51.190000 audit[1447]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff027189f0 a2=420 a3=0 items=0 ppid=1 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.200393 kernel: audit: type=1300 audit(1752109071.190:212): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff027189f0 a2=420 a3=0 items=0 ppid=1 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.200432 kernel: audit: type=1327 audit(1752109071.190:212): proctitle=2F7362696E2F617564697463746C002D44 Jul 10 00:57:51.190000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 10 00:57:51.196850 systemd[1]: audit-rules.service: Deactivated successfully. Jul 10 00:57:51.196946 systemd[1]: Stopped audit-rules.service. Jul 10 00:57:51.197947 systemd[1]: Starting audit-rules.service... Jul 10 00:57:51.201154 kernel: audit: type=1131 audit(1752109071.196:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:51.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:51.210564 augenrules[1464]: No rules Jul 10 00:57:51.211103 systemd[1]: Finished audit-rules.service. Jul 10 00:57:51.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:51.213870 sudo[1443]: pam_unix(sudo:session): session closed for user root Jul 10 00:57:51.217833 kernel: audit: type=1130 audit(1752109071.210:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:51.217873 kernel: audit: type=1106 audit(1752109071.213:215): pid=1443 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:57:51.217889 kernel: audit: type=1104 audit(1752109071.213:216): pid=1443 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:57:51.213000 audit[1443]: USER_END pid=1443 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:57:51.213000 audit[1443]: CRED_DISP pid=1443 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:57:51.219908 sshd[1439]: pam_unix(sshd:session): session closed for user core Jul 10 00:57:51.222136 systemd[1]: Started sshd@6-139.178.70.109:22-139.178.68.195:45338.service. Jul 10 00:57:51.227053 kernel: audit: type=1130 audit(1752109071.221:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.109:22-139.178.68.195:45338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:51.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.109:22-139.178.68.195:45338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:51.226316 systemd[1]: sshd@5-139.178.70.109:22-139.178.68.195:45332.service: Deactivated successfully. Jul 10 00:57:51.226750 systemd[1]: session-8.scope: Deactivated successfully. Jul 10 00:57:51.227322 systemd-logind[1239]: Session 8 logged out. Waiting for processes to exit. Jul 10 00:57:51.225000 audit[1439]: USER_END pid=1439 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:57:51.231587 kernel: audit: type=1106 audit(1752109071.225:218): pid=1439 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:57:51.231424 systemd-logind[1239]: Removed session 8. Jul 10 00:57:51.225000 audit[1439]: CRED_DISP pid=1439 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:57:51.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.109:22-139.178.68.195:45332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:51.235343 kernel: audit: type=1104 audit(1752109071.225:219): pid=1439 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:57:51.251000 audit[1469]: USER_ACCT pid=1469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:57:51.251755 sshd[1469]: Accepted publickey for core from 139.178.68.195 port 45338 ssh2: RSA SHA256:NVpdRDPpwzjVTzi6orhe1cA9BvcYymCSReGH8myOy/Q Jul 10 00:57:51.252000 audit[1469]: CRED_ACQ pid=1469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:57:51.252000 audit[1469]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf1720900 a2=3 a3=0 items=0 ppid=1 pid=1469 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.252000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 00:57:51.252663 sshd[1469]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:57:51.255421 systemd[1]: Started session-9.scope. Jul 10 00:57:51.255626 systemd-logind[1239]: New session 9 of user core. Jul 10 00:57:51.258000 audit[1469]: USER_START pid=1469 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:57:51.258000 audit[1472]: CRED_ACQ pid=1472 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:57:51.304000 audit[1473]: USER_ACCT pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:57:51.304585 sudo[1473]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 10 00:57:51.304711 sudo[1473]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:57:51.304000 audit[1473]: CRED_REFR pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:57:51.305000 audit[1473]: USER_START pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:57:51.318475 systemd[1]: Starting docker.service... Jul 10 00:57:51.339716 env[1484]: time="2025-07-10T00:57:51.339690500Z" level=info msg="Starting up" Jul 10 00:57:51.340826 env[1484]: time="2025-07-10T00:57:51.340814363Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 10 00:57:51.340877 env[1484]: time="2025-07-10T00:57:51.340866025Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 10 00:57:51.340929 env[1484]: time="2025-07-10T00:57:51.340917847Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 10 00:57:51.340971 env[1484]: time="2025-07-10T00:57:51.340962399Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 10 00:57:51.341886 env[1484]: time="2025-07-10T00:57:51.341875640Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 10 00:57:51.341939 env[1484]: time="2025-07-10T00:57:51.341929476Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 10 00:57:51.341986 env[1484]: time="2025-07-10T00:57:51.341974849Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 10 00:57:51.342027 env[1484]: time="2025-07-10T00:57:51.342017866Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 10 00:57:51.344844 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2200376610-merged.mount: Deactivated successfully. Jul 10 00:57:51.357189 env[1484]: time="2025-07-10T00:57:51.357171640Z" level=info msg="Loading containers: start." Jul 10 00:57:51.400000 audit[1514]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1514 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:57:51.400000 audit[1514]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff013e60e0 a2=0 a3=7fff013e60cc items=0 ppid=1484 pid=1514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.400000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 10 00:57:51.401000 audit[1516]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1516 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:57:51.401000 audit[1516]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc9a719440 a2=0 a3=7ffc9a71942c items=0 ppid=1484 pid=1516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.401000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Jul 10 00:57:51.402000 audit[1518]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1518 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:57:51.402000 audit[1518]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe2042dae0 a2=0 a3=7ffe2042dacc items=0 ppid=1484 pid=1518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.402000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 10 00:57:51.403000 audit[1520]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1520 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:57:51.403000 audit[1520]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff112796b0 a2=0 a3=7fff1127969c items=0 ppid=1484 pid=1520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.403000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 10 00:57:51.405000 audit[1522]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1522 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:57:51.405000 audit[1522]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcf23863f0 a2=0 a3=7ffcf23863dc items=0 ppid=1484 pid=1522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.405000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 10 00:57:51.418000 audit[1527]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1527 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:57:51.418000 audit[1527]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc055ac7e0 a2=0 a3=7ffc055ac7cc items=0 ppid=1484 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.418000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 10 00:57:51.421000 audit[1529]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1529 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:57:51.421000 audit[1529]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc36facdc0 a2=0 a3=7ffc36facdac items=0 ppid=1484 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.421000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Jul 10 00:57:51.423000 audit[1531]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1531 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:57:51.423000 audit[1531]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe37ef2a30 a2=0 a3=7ffe37ef2a1c items=0 ppid=1484 pid=1531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.423000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Jul 10 00:57:51.424000 audit[1533]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1533 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:57:51.424000 audit[1533]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd2770dad0 a2=0 a3=7ffd2770dabc items=0 ppid=1484 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.424000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 10 00:57:51.427000 audit[1537]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1537 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:57:51.427000 audit[1537]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc2368c090 a2=0 a3=7ffc2368c07c items=0 ppid=1484 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.427000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 10 00:57:51.432000 audit[1538]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1538 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:57:51.432000 audit[1538]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffefe5dab00 a2=0 a3=7ffefe5daaec items=0 ppid=1484 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.432000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 10 00:57:51.456352 kernel: Initializing XFRM netlink socket Jul 10 00:57:51.541674 env[1484]: time="2025-07-10T00:57:51.541655123Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 10 00:57:51.587000 audit[1546]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1546 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:57:51.587000 audit[1546]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd431b2d80 a2=0 a3=7ffd431b2d6c items=0 ppid=1484 pid=1546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.587000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 10 00:57:51.608000 audit[1549]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1549 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:57:51.608000 audit[1549]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffee3499f90 a2=0 a3=7ffee3499f7c items=0 ppid=1484 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.608000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 10 00:57:51.610000 audit[1552]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1552 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:57:51.610000 audit[1552]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff28d7b480 a2=0 a3=7fff28d7b46c items=0 ppid=1484 pid=1552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.610000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 10 00:57:51.611000 audit[1554]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1554 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:57:51.611000 audit[1554]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff9de5f550 a2=0 a3=7fff9de5f53c items=0 ppid=1484 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.611000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 10 00:57:51.612000 audit[1556]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1556 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:57:51.612000 audit[1556]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc1e9e2910 a2=0 a3=7ffc1e9e28fc items=0 ppid=1484 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.612000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 10 00:57:51.613000 audit[1558]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1558 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:57:51.613000 audit[1558]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe11ff37e0 a2=0 a3=7ffe11ff37cc items=0 ppid=1484 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.613000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 10 00:57:51.614000 audit[1560]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1560 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:57:51.614000 audit[1560]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc64cf4c60 a2=0 a3=7ffc64cf4c4c items=0 ppid=1484 pid=1560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.614000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 10 00:57:51.641000 audit[1563]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1563 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:57:51.641000 audit[1563]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd2b978280 a2=0 a3=7ffd2b97826c items=0 ppid=1484 pid=1563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.641000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 10 00:57:51.643000 audit[1565]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1565 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:57:51.643000 audit[1565]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd25eddd60 a2=0 a3=7ffd25eddd4c items=0 ppid=1484 pid=1565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.643000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 10 00:57:51.645000 audit[1567]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1567 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:57:51.645000 audit[1567]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd63abd300 a2=0 a3=7ffd63abd2ec items=0 ppid=1484 pid=1567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.645000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 10 00:57:51.646000 audit[1569]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1569 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:57:51.646000 audit[1569]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd75fa1d10 a2=0 a3=7ffd75fa1cfc items=0 ppid=1484 pid=1569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.646000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 10 00:57:51.647196 systemd-networkd[1059]: docker0: Link UP Jul 10 00:57:51.670000 audit[1573]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1573 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:57:51.670000 audit[1573]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc3481c050 a2=0 a3=7ffc3481c03c items=0 ppid=1484 pid=1573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.670000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 10 00:57:51.672000 audit[1574]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1574 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:57:51.672000 audit[1574]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe117a97d0 a2=0 a3=7ffe117a97bc items=0 ppid=1484 pid=1574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:57:51.672000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 10 00:57:51.673120 env[1484]: time="2025-07-10T00:57:51.673106288Z" level=info msg="Loading containers: done." Jul 10 00:57:51.680262 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3240764963-merged.mount: Deactivated successfully. Jul 10 00:57:51.775964 env[1484]: time="2025-07-10T00:57:51.774810514Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 10 00:57:51.775964 env[1484]: time="2025-07-10T00:57:51.774937663Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Jul 10 00:57:51.775964 env[1484]: time="2025-07-10T00:57:51.775017808Z" level=info msg="Daemon has completed initialization" Jul 10 00:57:51.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:51.821015 systemd[1]: Started docker.service. Jul 10 00:57:51.826692 env[1484]: time="2025-07-10T00:57:51.826653168Z" level=info msg="API listen on /run/docker.sock" Jul 10 00:57:52.925554 env[1248]: time="2025-07-10T00:57:52.925533391Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.6\"" Jul 10 00:57:53.457714 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2727662163.mount: Deactivated successfully. Jul 10 00:57:54.575533 env[1248]: time="2025-07-10T00:57:54.575503276Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:57:54.576288 env[1248]: time="2025-07-10T00:57:54.576274200Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8c5b95b1b5cb4a908fcbbbe81697c57019f9e9d89bfb5e0355235d440b7a6aa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:57:54.577273 env[1248]: time="2025-07-10T00:57:54.577260664Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:57:54.578229 env[1248]: time="2025-07-10T00:57:54.578212113Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:0f5764551d7de4ef70489ff8a70f32df7dea00701f5545af089b60bc5ede4f6f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:57:54.578786 env[1248]: time="2025-07-10T00:57:54.578771868Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.6\" returns image reference \"sha256:8c5b95b1b5cb4a908fcbbbe81697c57019f9e9d89bfb5e0355235d440b7a6aa9\"" Jul 10 00:57:54.579207 env[1248]: time="2025-07-10T00:57:54.579195384Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.6\"" Jul 10 00:57:55.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:55.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:55.604121 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Jul 10 00:57:55.604244 systemd[1]: Stopped kubelet.service. Jul 10 00:57:55.605196 systemd[1]: Starting kubelet.service... Jul 10 00:57:55.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:57:55.889080 systemd[1]: Started kubelet.service. Jul 10 00:57:55.920603 kubelet[1610]: E0710 00:57:55.920580 1610 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 10 00:57:55.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 10 00:57:55.921648 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 10 00:57:55.921722 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 10 00:57:56.098361 env[1248]: time="2025-07-10T00:57:56.097802706Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:57:56.102296 env[1248]: time="2025-07-10T00:57:56.102271002Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:77d0e7de0c6b41e2331c3997698c3f917527cf7bbe462f5c813f514e788436de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:57:56.103426 env[1248]: time="2025-07-10T00:57:56.103407977Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:57:56.104819 env[1248]: time="2025-07-10T00:57:56.104790859Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:3425f29c94a77d74cb89f38413e6274277dcf5e2bc7ab6ae953578a91e9e8356,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:57:56.105515 env[1248]: time="2025-07-10T00:57:56.105492759Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.6\" returns image reference \"sha256:77d0e7de0c6b41e2331c3997698c3f917527cf7bbe462f5c813f514e788436de\"" Jul 10 00:57:56.105925 env[1248]: time="2025-07-10T00:57:56.105908920Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.6\"" Jul 10 00:57:57.343452 env[1248]: time="2025-07-10T00:57:57.343417273Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:57:57.353468 env[1248]: time="2025-07-10T00:57:57.353448682Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b34d1cd163151c2491919f315274d85bff904721213f2b19341b403a28a39ae2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:57:57.361636 env[1248]: time="2025-07-10T00:57:57.361620050Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:57:57.372282 env[1248]: time="2025-07-10T00:57:57.372264851Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:130f633cbd1d70e2f4655350153cb3fc469f4d5a6310b4f0b49d93fb2ba2132b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:57:57.372549 env[1248]: time="2025-07-10T00:57:57.372534739Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.6\" returns image reference \"sha256:b34d1cd163151c2491919f315274d85bff904721213f2b19341b403a28a39ae2\"" Jul 10 00:57:57.373358 env[1248]: time="2025-07-10T00:57:57.373346373Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.6\"" Jul 10 00:57:58.596821 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount660605967.mount: Deactivated successfully. Jul 10 00:57:59.131427 env[1248]: time="2025-07-10T00:57:59.131392508Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:57:59.146870 env[1248]: time="2025-07-10T00:57:59.146842968Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:63f0cbe3b7339c5d006efc9964228e48271bae73039320037c451b5e8f763e02,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:57:59.157889 env[1248]: time="2025-07-10T00:57:59.157863096Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:57:59.160307 env[1248]: time="2025-07-10T00:57:59.160288648Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:b13d9da413b983d130bf090b83fce12e1ccc704e95f366da743c18e964d9d7e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:57:59.160783 env[1248]: time="2025-07-10T00:57:59.160764248Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.6\" returns image reference \"sha256:63f0cbe3b7339c5d006efc9964228e48271bae73039320037c451b5e8f763e02\"" Jul 10 00:57:59.161540 env[1248]: time="2025-07-10T00:57:59.161524194Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" Jul 10 00:57:59.692295 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3060273019.mount: Deactivated successfully. Jul 10 00:58:00.490788 env[1248]: time="2025-07-10T00:58:00.490745310Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:00.498110 env[1248]: time="2025-07-10T00:58:00.498086947Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:00.506968 env[1248]: time="2025-07-10T00:58:00.506944097Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:00.514461 env[1248]: time="2025-07-10T00:58:00.514441511Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:00.515029 env[1248]: time="2025-07-10T00:58:00.515005826Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" Jul 10 00:58:00.515729 env[1248]: time="2025-07-10T00:58:00.515707885Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Jul 10 00:58:00.962011 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3675592937.mount: Deactivated successfully. Jul 10 00:58:00.963989 env[1248]: time="2025-07-10T00:58:00.963966288Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:00.964461 env[1248]: time="2025-07-10T00:58:00.964445723Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:00.965260 env[1248]: time="2025-07-10T00:58:00.965245069Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:00.966112 env[1248]: time="2025-07-10T00:58:00.966096332Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:00.966504 env[1248]: time="2025-07-10T00:58:00.966488736Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Jul 10 00:58:00.966879 env[1248]: time="2025-07-10T00:58:00.966867348Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" Jul 10 00:58:01.430193 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount886377678.mount: Deactivated successfully. Jul 10 00:58:03.345555 env[1248]: time="2025-07-10T00:58:03.345513477Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:03.357050 env[1248]: time="2025-07-10T00:58:03.357025001Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:03.361318 env[1248]: time="2025-07-10T00:58:03.361295272Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:03.366729 env[1248]: time="2025-07-10T00:58:03.366704929Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:03.367420 env[1248]: time="2025-07-10T00:58:03.367398782Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc\"" Jul 10 00:58:04.975775 systemd[1]: Stopped kubelet.service. Jul 10 00:58:04.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:58:04.976639 kernel: kauditd_printk_skb: 88 callbacks suppressed Jul 10 00:58:04.976684 kernel: audit: type=1130 audit(1752109084.974:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:58:04.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:58:04.979733 systemd[1]: Starting kubelet.service... Jul 10 00:58:04.981650 kernel: audit: type=1131 audit(1752109084.977:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:58:04.999508 systemd[1]: Reloading. Jul 10 00:58:05.052797 /usr/lib/systemd/system-generators/torcx-generator[1660]: time="2025-07-10T00:58:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 10 00:58:05.052816 /usr/lib/systemd/system-generators/torcx-generator[1660]: time="2025-07-10T00:58:05Z" level=info msg="torcx already run" Jul 10 00:58:05.111255 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 10 00:58:05.111267 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 10 00:58:05.123401 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 10 00:58:05.173386 kernel: audit: type=1400 audit(1752109085.164:260): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.173465 kernel: audit: type=1400 audit(1752109085.164:261): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.173490 kernel: audit: type=1400 audit(1752109085.164:262): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.174339 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 10 00:58:05.176937 kernel: audit: type=1400 audit(1752109085.164:263): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.176968 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Jul 10 00:58:05.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.180121 kernel: audit: type=1400 audit(1752109085.164:264): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.180150 kernel: audit: backlog limit exceeded Jul 10 00:58:05.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.167000 audit: BPF prog-id=43 op=LOAD Jul 10 00:58:05.167000 audit: BPF prog-id=36 op=UNLOAD Jul 10 00:58:05.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.169000 audit: BPF prog-id=44 op=LOAD Jul 10 00:58:05.169000 audit: BPF prog-id=37 op=UNLOAD Jul 10 00:58:05.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit: BPF prog-id=45 op=LOAD Jul 10 00:58:05.172000 audit: BPF prog-id=27 op=UNLOAD Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit: BPF prog-id=46 op=LOAD Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit: BPF prog-id=47 op=LOAD Jul 10 00:58:05.172000 audit: BPF prog-id=28 op=UNLOAD Jul 10 00:58:05.172000 audit: BPF prog-id=29 op=UNLOAD Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.172000 audit: BPF prog-id=48 op=LOAD Jul 10 00:58:05.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.180000 audit: BPF prog-id=51 op=LOAD Jul 10 00:58:05.180000 audit: BPF prog-id=33 op=UNLOAD Jul 10 00:58:05.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.181000 audit: BPF prog-id=52 op=LOAD Jul 10 00:58:05.181000 audit: BPF prog-id=41 op=UNLOAD Jul 10 00:58:05.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.182000 audit: BPF prog-id=53 op=LOAD Jul 10 00:58:05.182000 audit: BPF prog-id=38 op=UNLOAD Jul 10 00:58:05.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.182000 audit: BPF prog-id=54 op=LOAD Jul 10 00:58:05.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.182000 audit: BPF prog-id=55 op=LOAD Jul 10 00:58:05.182000 audit: BPF prog-id=39 op=UNLOAD Jul 10 00:58:05.182000 audit: BPF prog-id=40 op=UNLOAD Jul 10 00:58:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.183000 audit: BPF prog-id=56 op=LOAD Jul 10 00:58:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:05.183000 audit: BPF prog-id=57 op=LOAD Jul 10 00:58:05.183000 audit: BPF prog-id=34 op=UNLOAD Jul 10 00:58:05.183000 audit: BPF prog-id=35 op=UNLOAD Jul 10 00:58:05.194575 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Jul 10 00:58:05.194616 systemd[1]: kubelet.service: Failed with result 'signal'. Jul 10 00:58:05.194782 systemd[1]: Stopped kubelet.service. Jul 10 00:58:05.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 10 00:58:05.196096 systemd[1]: Starting kubelet.service... Jul 10 00:58:05.405404 update_engine[1241]: I0710 00:58:05.405375 1241 update_attempter.cc:509] Updating boot flags... Jul 10 00:58:05.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:58:05.845753 systemd[1]: Started kubelet.service. Jul 10 00:58:06.068419 kubelet[1742]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 10 00:58:06.069002 kubelet[1742]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Jul 10 00:58:06.069052 kubelet[1742]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 10 00:58:06.069151 kubelet[1742]: I0710 00:58:06.069130 1742 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 10 00:58:06.240979 kubelet[1742]: I0710 00:58:06.240955 1742 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Jul 10 00:58:06.240979 kubelet[1742]: I0710 00:58:06.240973 1742 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 10 00:58:06.241224 kubelet[1742]: I0710 00:58:06.241213 1742 server.go:954] "Client rotation is on, will bootstrap in background" Jul 10 00:58:06.268494 kubelet[1742]: E0710 00:58:06.268467 1742 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://139.178.70.109:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 139.178.70.109:6443: connect: connection refused" logger="UnhandledError" Jul 10 00:58:06.271082 kubelet[1742]: I0710 00:58:06.271070 1742 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 10 00:58:06.276364 kubelet[1742]: E0710 00:58:06.276350 1742 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Jul 10 00:58:06.276441 kubelet[1742]: I0710 00:58:06.276433 1742 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Jul 10 00:58:06.278761 kubelet[1742]: I0710 00:58:06.278752 1742 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 10 00:58:06.278971 kubelet[1742]: I0710 00:58:06.278947 1742 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 10 00:58:06.279122 kubelet[1742]: I0710 00:58:06.279011 1742 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Jul 10 00:58:06.279809 kubelet[1742]: I0710 00:58:06.279801 1742 topology_manager.go:138] "Creating topology manager with none policy" Jul 10 00:58:06.279872 kubelet[1742]: I0710 00:58:06.279865 1742 container_manager_linux.go:304] "Creating device plugin manager" Jul 10 00:58:06.279983 kubelet[1742]: I0710 00:58:06.279976 1742 state_mem.go:36] "Initialized new in-memory state store" Jul 10 00:58:06.282806 kubelet[1742]: I0710 00:58:06.282798 1742 kubelet.go:446] "Attempting to sync node with API server" Jul 10 00:58:06.282865 kubelet[1742]: I0710 00:58:06.282857 1742 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 10 00:58:06.282918 kubelet[1742]: I0710 00:58:06.282910 1742 kubelet.go:352] "Adding apiserver pod source" Jul 10 00:58:06.282965 kubelet[1742]: I0710 00:58:06.282958 1742 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 10 00:58:06.287372 kubelet[1742]: I0710 00:58:06.287360 1742 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 10 00:58:06.287632 kubelet[1742]: I0710 00:58:06.287620 1742 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 10 00:58:06.288145 kubelet[1742]: W0710 00:58:06.288132 1742 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 10 00:58:06.292932 kubelet[1742]: I0710 00:58:06.292918 1742 watchdog_linux.go:99] "Systemd watchdog is not enabled" Jul 10 00:58:06.292969 kubelet[1742]: I0710 00:58:06.292938 1742 server.go:1287] "Started kubelet" Jul 10 00:58:06.293037 kubelet[1742]: W0710 00:58:06.293012 1742 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.109:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.109:6443: connect: connection refused Jul 10 00:58:06.293078 kubelet[1742]: E0710 00:58:06.293043 1742 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://139.178.70.109:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 139.178.70.109:6443: connect: connection refused" logger="UnhandledError" Jul 10 00:58:06.295474 kubelet[1742]: W0710 00:58:06.295456 1742 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.109:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 139.178.70.109:6443: connect: connection refused Jul 10 00:58:06.295545 kubelet[1742]: E0710 00:58:06.295527 1742 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://139.178.70.109:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 139.178.70.109:6443: connect: connection refused" logger="UnhandledError" Jul 10 00:58:06.295756 kubelet[1742]: I0710 00:58:06.295737 1742 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Jul 10 00:58:06.296913 kubelet[1742]: I0710 00:58:06.296806 1742 server.go:479] "Adding debug handlers to kubelet server" Jul 10 00:58:06.300360 kubelet[1742]: I0710 00:58:06.300311 1742 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 10 00:58:06.300485 kubelet[1742]: I0710 00:58:06.300474 1742 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 10 00:58:06.299000 audit[1742]: AVC avc: denied { mac_admin } for pid=1742 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:06.299000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 10 00:58:06.299000 audit[1742]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006dba70 a1=c000652e40 a2=c0006dba40 a3=25 items=0 ppid=1 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:06.299000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 10 00:58:06.299000 audit[1742]: AVC avc: denied { mac_admin } for pid=1742 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:06.299000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 10 00:58:06.299000 audit[1742]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ae3d60 a1=c000652e58 a2=c0006dbb00 a3=25 items=0 ppid=1 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:06.299000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 10 00:58:06.301143 kubelet[1742]: I0710 00:58:06.300889 1742 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Jul 10 00:58:06.301143 kubelet[1742]: I0710 00:58:06.300912 1742 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Jul 10 00:58:06.301143 kubelet[1742]: I0710 00:58:06.300946 1742 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 10 00:58:06.302509 kubelet[1742]: I0710 00:58:06.302495 1742 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Jul 10 00:58:06.306357 kubelet[1742]: E0710 00:58:06.303046 1742 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://139.178.70.109:6443/api/v1/namespaces/default/events\": dial tcp 139.178.70.109:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.1850bdee50396651 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-07-10 00:58:06.292928081 +0000 UTC m=+0.444786422,LastTimestamp:2025-07-10 00:58:06.292928081 +0000 UTC m=+0.444786422,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Jul 10 00:58:06.306357 kubelet[1742]: I0710 00:58:06.306097 1742 volume_manager.go:297] "Starting Kubelet Volume Manager" Jul 10 00:58:06.306357 kubelet[1742]: E0710 00:58:06.306220 1742 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Jul 10 00:58:06.307128 kubelet[1742]: I0710 00:58:06.307115 1742 factory.go:221] Registration of the systemd container factory successfully Jul 10 00:58:06.307168 kubelet[1742]: I0710 00:58:06.307157 1742 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 10 00:58:06.307782 kubelet[1742]: E0710 00:58:06.307683 1742 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.109:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.109:6443: connect: connection refused" interval="200ms" Jul 10 00:58:06.307901 kubelet[1742]: I0710 00:58:06.307887 1742 factory.go:221] Registration of the containerd container factory successfully Jul 10 00:58:06.309000 audit[1754]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1754 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:06.309000 audit[1754]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdfd7c22b0 a2=0 a3=7ffdfd7c229c items=0 ppid=1742 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:06.309000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 10 00:58:06.310000 audit[1755]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:06.310000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec8013930 a2=0 a3=7ffec801391c items=0 ppid=1742 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:06.310000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 10 00:58:06.312853 kubelet[1742]: I0710 00:58:06.312844 1742 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Jul 10 00:58:06.312922 kubelet[1742]: I0710 00:58:06.312916 1742 reconciler.go:26] "Reconciler: start to sync state" Jul 10 00:58:06.312000 audit[1757]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:06.312000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe15633640 a2=0 a3=7ffe1563362c items=0 ppid=1742 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:06.312000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 10 00:58:06.313000 audit[1759]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:06.313000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe3f9b45e0 a2=0 a3=7ffe3f9b45cc items=0 ppid=1742 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:06.313000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 10 00:58:06.320000 audit[1762]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:06.320000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd65399eb0 a2=0 a3=7ffd65399e9c items=0 ppid=1742 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:06.320000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 10 00:58:06.321950 kubelet[1742]: I0710 00:58:06.321934 1742 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 10 00:58:06.321000 audit[1763]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:06.321000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff53ce9b30 a2=0 a3=7fff53ce9b1c items=0 ppid=1742 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:06.321000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 10 00:58:06.322595 kubelet[1742]: I0710 00:58:06.322587 1742 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 10 00:58:06.322638 kubelet[1742]: I0710 00:58:06.322632 1742 status_manager.go:227] "Starting to sync pod status with apiserver" Jul 10 00:58:06.322688 kubelet[1742]: I0710 00:58:06.322680 1742 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Jul 10 00:58:06.322729 kubelet[1742]: I0710 00:58:06.322723 1742 kubelet.go:2382] "Starting kubelet main sync loop" Jul 10 00:58:06.322793 kubelet[1742]: E0710 00:58:06.322784 1742 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 10 00:58:06.322000 audit[1764]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:06.322000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2deeb4a0 a2=0 a3=7ffd2deeb48c items=0 ppid=1742 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:06.322000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 10 00:58:06.322000 audit[1765]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:06.322000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7edd85c0 a2=0 a3=7ffc7edd85ac items=0 ppid=1742 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:06.322000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 10 00:58:06.327137 kubelet[1742]: W0710 00:58:06.327112 1742 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.109:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.109:6443: connect: connection refused Jul 10 00:58:06.327185 kubelet[1742]: E0710 00:58:06.327142 1742 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://139.178.70.109:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 139.178.70.109:6443: connect: connection refused" logger="UnhandledError" Jul 10 00:58:06.327212 kubelet[1742]: W0710 00:58:06.327189 1742 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.109:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.109:6443: connect: connection refused Jul 10 00:58:06.327232 kubelet[1742]: E0710 00:58:06.327212 1742 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://139.178.70.109:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 139.178.70.109:6443: connect: connection refused" logger="UnhandledError" Jul 10 00:58:06.328046 kubelet[1742]: I0710 00:58:06.328034 1742 cpu_manager.go:221] "Starting CPU manager" policy="none" Jul 10 00:58:06.328046 kubelet[1742]: I0710 00:58:06.328043 1742 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Jul 10 00:58:06.328103 kubelet[1742]: I0710 00:58:06.328052 1742 state_mem.go:36] "Initialized new in-memory state store" Jul 10 00:58:06.327000 audit[1769]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:06.327000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc60962360 a2=0 a3=7ffc6096234c items=0 ppid=1742 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:06.327000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 10 00:58:06.327000 audit[1768]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:06.327000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5bd61470 a2=0 a3=7ffd5bd6145c items=0 ppid=1742 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:06.327000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 10 00:58:06.329027 kubelet[1742]: I0710 00:58:06.328990 1742 policy_none.go:49] "None policy: Start" Jul 10 00:58:06.329027 kubelet[1742]: I0710 00:58:06.329002 1742 memory_manager.go:186] "Starting memorymanager" policy="None" Jul 10 00:58:06.329027 kubelet[1742]: I0710 00:58:06.329008 1742 state_mem.go:35] "Initializing new in-memory state store" Jul 10 00:58:06.328000 audit[1771]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:06.328000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc6602e520 a2=0 a3=7ffc6602e50c items=0 ppid=1742 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:06.328000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 10 00:58:06.329000 audit[1772]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:06.329000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc38b8fa30 a2=0 a3=7ffc38b8fa1c items=0 ppid=1742 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:06.329000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 10 00:58:06.331848 systemd[1]: Created slice kubepods.slice. Jul 10 00:58:06.334485 systemd[1]: Created slice kubepods-burstable.slice. Jul 10 00:58:06.336115 systemd[1]: Created slice kubepods-besteffort.slice. Jul 10 00:58:06.340797 kubelet[1742]: I0710 00:58:06.340779 1742 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 10 00:58:06.339000 audit[1742]: AVC avc: denied { mac_admin } for pid=1742 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:06.339000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 10 00:58:06.339000 audit[1742]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cdf980 a1=c000e2f848 a2=c000cdf950 a3=25 items=0 ppid=1 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:06.339000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 10 00:58:06.341131 kubelet[1742]: I0710 00:58:06.340951 1742 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Jul 10 00:58:06.341131 kubelet[1742]: I0710 00:58:06.341096 1742 eviction_manager.go:189] "Eviction manager: starting control loop" Jul 10 00:58:06.341131 kubelet[1742]: I0710 00:58:06.341105 1742 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 10 00:58:06.342347 kubelet[1742]: E0710 00:58:06.342323 1742 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Jul 10 00:58:06.342395 kubelet[1742]: E0710 00:58:06.342386 1742 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Jul 10 00:58:06.342468 kubelet[1742]: I0710 00:58:06.342430 1742 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 10 00:58:06.429835 systemd[1]: Created slice kubepods-burstable-podd09f4decdcb52906d18749e7887207e2.slice. Jul 10 00:58:06.434833 kubelet[1742]: E0710 00:58:06.434821 1742 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Jul 10 00:58:06.437613 systemd[1]: Created slice kubepods-burstable-pod8a75e163f27396b2168da0f88f85f8a5.slice. Jul 10 00:58:06.439518 kubelet[1742]: E0710 00:58:06.439508 1742 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Jul 10 00:58:06.441001 systemd[1]: Created slice kubepods-burstable-podd1af03769b64da1b1e8089a7035018fc.slice. Jul 10 00:58:06.441843 kubelet[1742]: I0710 00:58:06.441831 1742 kubelet_node_status.go:75] "Attempting to register node" node="localhost" Jul 10 00:58:06.442202 kubelet[1742]: E0710 00:58:06.442010 1742 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://139.178.70.109:6443/api/v1/nodes\": dial tcp 139.178.70.109:6443: connect: connection refused" node="localhost" Jul 10 00:58:06.442553 kubelet[1742]: E0710 00:58:06.442539 1742 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Jul 10 00:58:06.508210 kubelet[1742]: E0710 00:58:06.508134 1742 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.109:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.109:6443: connect: connection refused" interval="400ms" Jul 10 00:58:06.513565 kubelet[1742]: I0710 00:58:06.513545 1742 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d09f4decdcb52906d18749e7887207e2-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"d09f4decdcb52906d18749e7887207e2\") " pod="kube-system/kube-apiserver-localhost" Jul 10 00:58:06.513642 kubelet[1742]: I0710 00:58:06.513581 1742 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d09f4decdcb52906d18749e7887207e2-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"d09f4decdcb52906d18749e7887207e2\") " pod="kube-system/kube-apiserver-localhost" Jul 10 00:58:06.513642 kubelet[1742]: I0710 00:58:06.513596 1742 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d1af03769b64da1b1e8089a7035018fc-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d1af03769b64da1b1e8089a7035018fc\") " pod="kube-system/kube-controller-manager-localhost" Jul 10 00:58:06.513642 kubelet[1742]: I0710 00:58:06.513608 1742 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d1af03769b64da1b1e8089a7035018fc-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d1af03769b64da1b1e8089a7035018fc\") " pod="kube-system/kube-controller-manager-localhost" Jul 10 00:58:06.513642 kubelet[1742]: I0710 00:58:06.513620 1742 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8a75e163f27396b2168da0f88f85f8a5-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"8a75e163f27396b2168da0f88f85f8a5\") " pod="kube-system/kube-scheduler-localhost" Jul 10 00:58:06.513642 kubelet[1742]: I0710 00:58:06.513632 1742 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d09f4decdcb52906d18749e7887207e2-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"d09f4decdcb52906d18749e7887207e2\") " pod="kube-system/kube-apiserver-localhost" Jul 10 00:58:06.513779 kubelet[1742]: I0710 00:58:06.513643 1742 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d1af03769b64da1b1e8089a7035018fc-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d1af03769b64da1b1e8089a7035018fc\") " pod="kube-system/kube-controller-manager-localhost" Jul 10 00:58:06.513779 kubelet[1742]: I0710 00:58:06.513688 1742 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d1af03769b64da1b1e8089a7035018fc-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d1af03769b64da1b1e8089a7035018fc\") " pod="kube-system/kube-controller-manager-localhost" Jul 10 00:58:06.513779 kubelet[1742]: I0710 00:58:06.513704 1742 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d1af03769b64da1b1e8089a7035018fc-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d1af03769b64da1b1e8089a7035018fc\") " pod="kube-system/kube-controller-manager-localhost" Jul 10 00:58:06.644049 kubelet[1742]: I0710 00:58:06.644027 1742 kubelet_node_status.go:75] "Attempting to register node" node="localhost" Jul 10 00:58:06.644348 kubelet[1742]: E0710 00:58:06.644306 1742 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://139.178.70.109:6443/api/v1/nodes\": dial tcp 139.178.70.109:6443: connect: connection refused" node="localhost" Jul 10 00:58:06.736411 env[1248]: time="2025-07-10T00:58:06.736379206Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:d09f4decdcb52906d18749e7887207e2,Namespace:kube-system,Attempt:0,}" Jul 10 00:58:06.740049 env[1248]: time="2025-07-10T00:58:06.740029068Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:8a75e163f27396b2168da0f88f85f8a5,Namespace:kube-system,Attempt:0,}" Jul 10 00:58:06.743649 env[1248]: time="2025-07-10T00:58:06.743618332Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d1af03769b64da1b1e8089a7035018fc,Namespace:kube-system,Attempt:0,}" Jul 10 00:58:06.909478 kubelet[1742]: E0710 00:58:06.909434 1742 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.109:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.109:6443: connect: connection refused" interval="800ms" Jul 10 00:58:07.046184 kubelet[1742]: I0710 00:58:07.046162 1742 kubelet_node_status.go:75] "Attempting to register node" node="localhost" Jul 10 00:58:07.046377 kubelet[1742]: E0710 00:58:07.046361 1742 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://139.178.70.109:6443/api/v1/nodes\": dial tcp 139.178.70.109:6443: connect: connection refused" node="localhost" Jul 10 00:58:07.388694 kubelet[1742]: W0710 00:58:07.388648 1742 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.109:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 139.178.70.109:6443: connect: connection refused Jul 10 00:58:07.388955 kubelet[1742]: E0710 00:58:07.388709 1742 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://139.178.70.109:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 139.178.70.109:6443: connect: connection refused" logger="UnhandledError" Jul 10 00:58:07.448312 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount655593631.mount: Deactivated successfully. Jul 10 00:58:07.450594 env[1248]: time="2025-07-10T00:58:07.450574230Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:07.451116 env[1248]: time="2025-07-10T00:58:07.451103450Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:07.451584 env[1248]: time="2025-07-10T00:58:07.451570695Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:07.452286 env[1248]: time="2025-07-10T00:58:07.452274642Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:07.453429 env[1248]: time="2025-07-10T00:58:07.453411382Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:07.455207 env[1248]: time="2025-07-10T00:58:07.455194660Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:07.456883 env[1248]: time="2025-07-10T00:58:07.456868707Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:07.457547 env[1248]: time="2025-07-10T00:58:07.457535901Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:07.458591 env[1248]: time="2025-07-10T00:58:07.458571457Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:07.459077 env[1248]: time="2025-07-10T00:58:07.459061844Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:07.459539 env[1248]: time="2025-07-10T00:58:07.459518448Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:07.459972 env[1248]: time="2025-07-10T00:58:07.459956068Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:07.467779 kubelet[1742]: W0710 00:58:07.467756 1742 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.109:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.109:6443: connect: connection refused Jul 10 00:58:07.467864 kubelet[1742]: E0710 00:58:07.467784 1742 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://139.178.70.109:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 139.178.70.109:6443: connect: connection refused" logger="UnhandledError" Jul 10 00:58:07.471147 kubelet[1742]: W0710 00:58:07.470247 1742 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.109:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.109:6443: connect: connection refused Jul 10 00:58:07.471147 kubelet[1742]: E0710 00:58:07.470297 1742 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://139.178.70.109:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 139.178.70.109:6443: connect: connection refused" logger="UnhandledError" Jul 10 00:58:07.477171 env[1248]: time="2025-07-10T00:58:07.472004086Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:58:07.477171 env[1248]: time="2025-07-10T00:58:07.472025785Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:58:07.477171 env[1248]: time="2025-07-10T00:58:07.472032494Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:58:07.477171 env[1248]: time="2025-07-10T00:58:07.472095285Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cae26d7f55f543f93ab807a69025053310321db2c07edb02f09b6b87aae058e0 pid=1789 runtime=io.containerd.runc.v2 Jul 10 00:58:07.477466 env[1248]: time="2025-07-10T00:58:07.472789900Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:58:07.477466 env[1248]: time="2025-07-10T00:58:07.472822028Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:58:07.477466 env[1248]: time="2025-07-10T00:58:07.472829769Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:58:07.477466 env[1248]: time="2025-07-10T00:58:07.472926570Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/efbd4005c4f1b50334ba74e45f50a4398a8fa9f463dd15fc1bdba6ee18046ebd pid=1781 runtime=io.containerd.runc.v2 Jul 10 00:58:07.496573 systemd[1]: Started cri-containerd-efbd4005c4f1b50334ba74e45f50a4398a8fa9f463dd15fc1bdba6ee18046ebd.scope. Jul 10 00:58:07.502680 systemd[1]: Started cri-containerd-cae26d7f55f543f93ab807a69025053310321db2c07edb02f09b6b87aae058e0.scope. Jul 10 00:58:07.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.509000 audit: BPF prog-id=58 op=LOAD Jul 10 00:58:07.510000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.510000 audit[1811]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1781 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566626434303035633466316235303333346261373465343566353061 Jul 10 00:58:07.510000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.510000 audit[1811]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1781 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566626434303035633466316235303333346261373465343566353061 Jul 10 00:58:07.510000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.510000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.510000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.510000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.510000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.510000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.510000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.510000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.510000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.510000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.510000 audit: BPF prog-id=59 op=LOAD Jul 10 00:58:07.510000 audit[1811]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003071e0 items=0 ppid=1781 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566626434303035633466316235303333346261373465343566353061 Jul 10 00:58:07.511000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.511000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.511000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.511000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.511000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.511000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.511000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.511000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.511000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.511000 audit: BPF prog-id=60 op=LOAD Jul 10 00:58:07.511000 audit[1811]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000307228 items=0 ppid=1781 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566626434303035633466316235303333346261373465343566353061 Jul 10 00:58:07.511000 audit: BPF prog-id=60 op=UNLOAD Jul 10 00:58:07.511000 audit: BPF prog-id=59 op=UNLOAD Jul 10 00:58:07.511000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.511000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.511000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.511000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.511000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.511000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.511000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.511000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.511000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.511000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.511000 audit: BPF prog-id=61 op=LOAD Jul 10 00:58:07.511000 audit[1811]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000307638 items=0 ppid=1781 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566626434303035633466316235303333346261373465343566353061 Jul 10 00:58:07.516176 env[1248]: time="2025-07-10T00:58:07.516139312Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:58:07.516276 env[1248]: time="2025-07-10T00:58:07.516261443Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:58:07.516416 env[1248]: time="2025-07-10T00:58:07.516399866Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:58:07.516560 env[1248]: time="2025-07-10T00:58:07.516544286Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c57946d9e85df0df95ae70266daa0a83f6340bbe97fe63716b98d7a4d0cfbe26 pid=1842 runtime=io.containerd.runc.v2 Jul 10 00:58:07.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.517000 audit: BPF prog-id=62 op=LOAD Jul 10 00:58:07.517000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.517000 audit[1810]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1789 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361653236643766353566353433663933616238303761363930323530 Jul 10 00:58:07.517000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.517000 audit[1810]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1789 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361653236643766353566353433663933616238303761363930323530 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit: BPF prog-id=63 op=LOAD Jul 10 00:58:07.520000 audit[1810]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00027d040 items=0 ppid=1789 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361653236643766353566353433663933616238303761363930323530 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit: BPF prog-id=64 op=LOAD Jul 10 00:58:07.520000 audit[1810]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00027d088 items=0 ppid=1789 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361653236643766353566353433663933616238303761363930323530 Jul 10 00:58:07.520000 audit: BPF prog-id=64 op=UNLOAD Jul 10 00:58:07.520000 audit: BPF prog-id=63 op=UNLOAD Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.520000 audit: BPF prog-id=65 op=LOAD Jul 10 00:58:07.520000 audit[1810]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00027d498 items=0 ppid=1789 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361653236643766353566353433663933616238303761363930323530 Jul 10 00:58:07.532734 systemd[1]: Started cri-containerd-c57946d9e85df0df95ae70266daa0a83f6340bbe97fe63716b98d7a4d0cfbe26.scope. Jul 10 00:58:07.556767 env[1248]: time="2025-07-10T00:58:07.556740063Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:d09f4decdcb52906d18749e7887207e2,Namespace:kube-system,Attempt:0,} returns sandbox id \"cae26d7f55f543f93ab807a69025053310321db2c07edb02f09b6b87aae058e0\"" Jul 10 00:58:07.558641 env[1248]: time="2025-07-10T00:58:07.558624759Z" level=info msg="CreateContainer within sandbox \"cae26d7f55f543f93ab807a69025053310321db2c07edb02f09b6b87aae058e0\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Jul 10 00:58:07.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.561000 audit: BPF prog-id=66 op=LOAD Jul 10 00:58:07.562000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.564068 env[1248]: time="2025-07-10T00:58:07.564049602Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d1af03769b64da1b1e8089a7035018fc,Namespace:kube-system,Attempt:0,} returns sandbox id \"efbd4005c4f1b50334ba74e45f50a4398a8fa9f463dd15fc1bdba6ee18046ebd\"" Jul 10 00:58:07.562000 audit[1856]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1842 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335373934366439653835646630646639356165373032363664616130 Jul 10 00:58:07.563000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.563000 audit[1856]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1842 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335373934366439653835646630646639356165373032363664616130 Jul 10 00:58:07.564000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.564000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.565744 env[1248]: time="2025-07-10T00:58:07.565682578Z" level=info msg="CreateContainer within sandbox \"efbd4005c4f1b50334ba74e45f50a4398a8fa9f463dd15fc1bdba6ee18046ebd\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Jul 10 00:58:07.564000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.564000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.564000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.564000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.564000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.564000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.564000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.564000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.564000 audit: BPF prog-id=67 op=LOAD Jul 10 00:58:07.564000 audit[1856]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000372780 items=0 ppid=1842 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335373934366439653835646630646639356165373032363664616130 Jul 10 00:58:07.564000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.564000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.564000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.564000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.564000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.564000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.564000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.564000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.564000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.564000 audit: BPF prog-id=68 op=LOAD Jul 10 00:58:07.564000 audit[1856]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003727c8 items=0 ppid=1842 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335373934366439653835646630646639356165373032363664616130 Jul 10 00:58:07.565000 audit: BPF prog-id=68 op=UNLOAD Jul 10 00:58:07.565000 audit: BPF prog-id=67 op=UNLOAD Jul 10 00:58:07.565000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.565000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.565000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.565000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.565000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.565000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.565000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.565000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.565000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.565000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.565000 audit: BPF prog-id=69 op=LOAD Jul 10 00:58:07.565000 audit[1856]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000372bd8 items=0 ppid=1842 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335373934366439653835646630646639356165373032363664616130 Jul 10 00:58:07.574688 env[1248]: time="2025-07-10T00:58:07.574664805Z" level=info msg="CreateContainer within sandbox \"cae26d7f55f543f93ab807a69025053310321db2c07edb02f09b6b87aae058e0\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"477bc6e63b7e53e54838a4a3b68acbfb20e1acb5a3b0a29504d8002538549a59\"" Jul 10 00:58:07.575581 env[1248]: time="2025-07-10T00:58:07.575560366Z" level=info msg="StartContainer for \"477bc6e63b7e53e54838a4a3b68acbfb20e1acb5a3b0a29504d8002538549a59\"" Jul 10 00:58:07.576391 env[1248]: time="2025-07-10T00:58:07.576375929Z" level=info msg="CreateContainer within sandbox \"efbd4005c4f1b50334ba74e45f50a4398a8fa9f463dd15fc1bdba6ee18046ebd\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"5bf0a0cb3e24f83dae79785364c46e32afbf46ffac3c163c59054ebebc620d5e\"" Jul 10 00:58:07.577458 env[1248]: time="2025-07-10T00:58:07.577447279Z" level=info msg="StartContainer for \"5bf0a0cb3e24f83dae79785364c46e32afbf46ffac3c163c59054ebebc620d5e\"" Jul 10 00:58:07.589262 systemd[1]: Started cri-containerd-477bc6e63b7e53e54838a4a3b68acbfb20e1acb5a3b0a29504d8002538549a59.scope. Jul 10 00:58:07.596781 systemd[1]: Started cri-containerd-5bf0a0cb3e24f83dae79785364c46e32afbf46ffac3c163c59054ebebc620d5e.scope. Jul 10 00:58:07.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.603000 audit: BPF prog-id=70 op=LOAD Jul 10 00:58:07.603000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.603000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=1789 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437376263366536336237653533653534383338613461336236386163 Jul 10 00:58:07.603000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.603000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=1789 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437376263366536336237653533653534383338613461336236386163 Jul 10 00:58:07.604000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.604000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.604000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.604000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.604000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.604000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.604000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.604000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.604000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.604000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.604000 audit: BPF prog-id=71 op=LOAD Jul 10 00:58:07.604000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c00021bad0 items=0 ppid=1789 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437376263366536336237653533653534383338613461336236386163 Jul 10 00:58:07.604000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.604000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.604000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.604000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.604000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.604000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.604000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.604000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.605000 audit: BPF prog-id=72 op=LOAD Jul 10 00:58:07.605000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.605000 audit[1910]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1781 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663061306362336532346638336461653739373835333634633436 Jul 10 00:58:07.605000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.605000 audit[1910]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1781 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663061306362336532346638336461653739373835333634633436 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit: BPF prog-id=73 op=LOAD Jul 10 00:58:07.606000 audit[1910]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000292370 items=0 ppid=1781 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663061306362336532346638336461653739373835333634633436 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit: BPF prog-id=74 op=LOAD Jul 10 00:58:07.606000 audit[1910]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002923b8 items=0 ppid=1781 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663061306362336532346638336461653739373835333634633436 Jul 10 00:58:07.606000 audit: BPF prog-id=74 op=UNLOAD Jul 10 00:58:07.606000 audit: BPF prog-id=73 op=UNLOAD Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { perfmon } for pid=1910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit[1910]: AVC avc: denied { bpf } for pid=1910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.606000 audit: BPF prog-id=75 op=LOAD Jul 10 00:58:07.606000 audit[1910]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002927c8 items=0 ppid=1781 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663061306362336532346638336461653739373835333634633436 Jul 10 00:58:07.604000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.604000 audit: BPF prog-id=76 op=LOAD Jul 10 00:58:07.604000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c00021bb18 items=0 ppid=1789 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437376263366536336237653533653534383338613461336236386163 Jul 10 00:58:07.607000 audit: BPF prog-id=76 op=UNLOAD Jul 10 00:58:07.607000 audit: BPF prog-id=71 op=UNLOAD Jul 10 00:58:07.607000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.607000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.607000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.607000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.607000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.607000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.607000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.607000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.607000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.607000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.607000 audit: BPF prog-id=77 op=LOAD Jul 10 00:58:07.607000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c00021bf28 items=0 ppid=1789 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437376263366536336237653533653534383338613461336236386163 Jul 10 00:58:07.610797 env[1248]: time="2025-07-10T00:58:07.610774505Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:8a75e163f27396b2168da0f88f85f8a5,Namespace:kube-system,Attempt:0,} returns sandbox id \"c57946d9e85df0df95ae70266daa0a83f6340bbe97fe63716b98d7a4d0cfbe26\"" Jul 10 00:58:07.614825 env[1248]: time="2025-07-10T00:58:07.614805824Z" level=info msg="CreateContainer within sandbox \"c57946d9e85df0df95ae70266daa0a83f6340bbe97fe63716b98d7a4d0cfbe26\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Jul 10 00:58:07.619920 env[1248]: time="2025-07-10T00:58:07.619887334Z" level=info msg="CreateContainer within sandbox \"c57946d9e85df0df95ae70266daa0a83f6340bbe97fe63716b98d7a4d0cfbe26\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"f979f954dc4b621d38be74a1ddaf7f8bbb36a54a0054a5d4872d99e28d86033b\"" Jul 10 00:58:07.620305 env[1248]: time="2025-07-10T00:58:07.620291795Z" level=info msg="StartContainer for \"f979f954dc4b621d38be74a1ddaf7f8bbb36a54a0054a5d4872d99e28d86033b\"" Jul 10 00:58:07.629691 systemd[1]: Started cri-containerd-f979f954dc4b621d38be74a1ddaf7f8bbb36a54a0054a5d4872d99e28d86033b.scope. Jul 10 00:58:07.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.650000 audit: BPF prog-id=78 op=LOAD Jul 10 00:58:07.651900 env[1248]: time="2025-07-10T00:58:07.650849100Z" level=info msg="StartContainer for \"477bc6e63b7e53e54838a4a3b68acbfb20e1acb5a3b0a29504d8002538549a59\" returns successfully" Jul 10 00:58:07.651000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.651000 audit[1954]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1842 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639373966393534646334623632316433386265373461316464616637 Jul 10 00:58:07.651000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.651000 audit[1954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1842 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639373966393534646334623632316433386265373461316464616637 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit: BPF prog-id=79 op=LOAD Jul 10 00:58:07.652000 audit[1954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003e2690 items=0 ppid=1842 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639373966393534646334623632316433386265373461316464616637 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit: BPF prog-id=80 op=LOAD Jul 10 00:58:07.652000 audit[1954]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003e26d8 items=0 ppid=1842 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639373966393534646334623632316433386265373461316464616637 Jul 10 00:58:07.652000 audit: BPF prog-id=80 op=UNLOAD Jul 10 00:58:07.652000 audit: BPF prog-id=79 op=UNLOAD Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { perfmon } for pid=1954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit[1954]: AVC avc: denied { bpf } for pid=1954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:07.652000 audit: BPF prog-id=81 op=LOAD Jul 10 00:58:07.652000 audit[1954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e2ae8 items=0 ppid=1842 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:07.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639373966393534646334623632316433386265373461316464616637 Jul 10 00:58:07.677006 env[1248]: time="2025-07-10T00:58:07.676965741Z" level=info msg="StartContainer for \"5bf0a0cb3e24f83dae79785364c46e32afbf46ffac3c163c59054ebebc620d5e\" returns successfully" Jul 10 00:58:07.682970 env[1248]: time="2025-07-10T00:58:07.682950669Z" level=info msg="StartContainer for \"f979f954dc4b621d38be74a1ddaf7f8bbb36a54a0054a5d4872d99e28d86033b\" returns successfully" Jul 10 00:58:07.709801 kubelet[1742]: E0710 00:58:07.709762 1742 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.109:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.109:6443: connect: connection refused" interval="1.6s" Jul 10 00:58:07.756503 kubelet[1742]: W0710 00:58:07.756439 1742 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.109:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.109:6443: connect: connection refused Jul 10 00:58:07.756503 kubelet[1742]: E0710 00:58:07.756482 1742 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://139.178.70.109:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 139.178.70.109:6443: connect: connection refused" logger="UnhandledError" Jul 10 00:58:07.847308 kubelet[1742]: I0710 00:58:07.847098 1742 kubelet_node_status.go:75] "Attempting to register node" node="localhost" Jul 10 00:58:07.847308 kubelet[1742]: E0710 00:58:07.847284 1742 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://139.178.70.109:6443/api/v1/nodes\": dial tcp 139.178.70.109:6443: connect: connection refused" node="localhost" Jul 10 00:58:08.303165 kubelet[1742]: E0710 00:58:08.303120 1742 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://139.178.70.109:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 139.178.70.109:6443: connect: connection refused" logger="UnhandledError" Jul 10 00:58:08.331442 kubelet[1742]: E0710 00:58:08.331425 1742 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Jul 10 00:58:08.332656 kubelet[1742]: E0710 00:58:08.332646 1742 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Jul 10 00:58:08.333761 kubelet[1742]: E0710 00:58:08.333752 1742 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Jul 10 00:58:08.652000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:58:08.652000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000474de0 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 00:58:08.652000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 00:58:08.652000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:58:08.652000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0003fad00 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 00:58:08.652000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 00:58:09.326000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:58:09.326000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c00432bda0 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 00:58:09.326000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 00:58:09.326000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:58:09.326000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=46 a1=c003d920f0 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 00:58:09.326000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 00:58:09.326000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7325 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:58:09.326000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c003d92300 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 00:58:09.326000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 00:58:09.335798 kubelet[1742]: E0710 00:58:09.335782 1742 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Jul 10 00:58:09.336370 kubelet[1742]: E0710 00:58:09.336347 1742 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Jul 10 00:58:09.353000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7319 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:58:09.353000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c0069e1770 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 00:58:09.353000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 00:58:09.371000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:58:09.371000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c002af8b20 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 00:58:09.371000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 00:58:09.371000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:58:09.371000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c006e3a810 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 00:58:09.371000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 00:58:09.433200 kubelet[1742]: E0710 00:58:09.433170 1742 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Jul 10 00:58:09.448239 kubelet[1742]: I0710 00:58:09.448218 1742 kubelet_node_status.go:75] "Attempting to register node" node="localhost" Jul 10 00:58:09.608129 kubelet[1742]: I0710 00:58:09.608105 1742 kubelet_node_status.go:78] "Successfully registered node" node="localhost" Jul 10 00:58:09.608264 kubelet[1742]: E0710 00:58:09.608253 1742 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" Jul 10 00:58:09.617679 kubelet[1742]: E0710 00:58:09.617654 1742 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Jul 10 00:58:09.718622 kubelet[1742]: E0710 00:58:09.718602 1742 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Jul 10 00:58:09.819257 kubelet[1742]: E0710 00:58:09.819227 1742 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" Jul 10 00:58:09.821441 kubelet[1742]: E0710 00:58:09.821426 1742 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" Jul 10 00:58:10.007619 kubelet[1742]: I0710 00:58:10.007543 1742 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" Jul 10 00:58:10.011581 kubelet[1742]: E0710 00:58:10.011562 1742 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" Jul 10 00:58:10.011581 kubelet[1742]: I0710 00:58:10.011579 1742 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" Jul 10 00:58:10.012513 kubelet[1742]: E0710 00:58:10.012494 1742 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-localhost" Jul 10 00:58:10.012513 kubelet[1742]: I0710 00:58:10.012513 1742 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" Jul 10 00:58:10.013301 kubelet[1742]: E0710 00:58:10.013285 1742 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-localhost" Jul 10 00:58:10.297594 kubelet[1742]: I0710 00:58:10.297522 1742 apiserver.go:52] "Watching apiserver" Jul 10 00:58:10.313475 kubelet[1742]: I0710 00:58:10.313452 1742 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Jul 10 00:58:11.000557 systemd[1]: Reloading. Jul 10 00:58:11.073704 /usr/lib/systemd/system-generators/torcx-generator[2033]: time="2025-07-10T00:58:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 10 00:58:11.073957 /usr/lib/systemd/system-generators/torcx-generator[2033]: time="2025-07-10T00:58:11Z" level=info msg="torcx already run" Jul 10 00:58:11.123195 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 10 00:58:11.123324 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 10 00:58:11.135740 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 10 00:58:11.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.194450 kernel: kauditd_printk_skb: 632 callbacks suppressed Jul 10 00:58:11.194502 kernel: audit: type=1400 audit(1752109091.190:539): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.196876 kernel: audit: type=1400 audit(1752109091.190:540): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.196919 kernel: audit: type=1400 audit(1752109091.190:541): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.201950 kernel: audit: type=1400 audit(1752109091.190:542): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.201982 kernel: audit: type=1400 audit(1752109091.190:543): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.204461 kernel: audit: type=1400 audit(1752109091.190:544): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.209224 kernel: audit: type=1400 audit(1752109091.190:545): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.209257 kernel: audit: type=1400 audit(1752109091.190:546): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.213928 kernel: audit: type=1400 audit(1752109091.190:547): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.213972 kernel: audit: type=1400 audit(1752109091.193:548): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.193000 audit: BPF prog-id=82 op=LOAD Jul 10 00:58:11.193000 audit: BPF prog-id=72 op=UNLOAD Jul 10 00:58:11.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.195000 audit: BPF prog-id=83 op=LOAD Jul 10 00:58:11.195000 audit: BPF prog-id=43 op=UNLOAD Jul 10 00:58:11.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.198000 audit: BPF prog-id=84 op=LOAD Jul 10 00:58:11.198000 audit: BPF prog-id=44 op=UNLOAD Jul 10 00:58:11.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.205000 audit: BPF prog-id=85 op=LOAD Jul 10 00:58:11.205000 audit: BPF prog-id=66 op=UNLOAD Jul 10 00:58:11.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.210000 audit: BPF prog-id=86 op=LOAD Jul 10 00:58:11.210000 audit: BPF prog-id=45 op=UNLOAD Jul 10 00:58:11.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.214000 audit: BPF prog-id=87 op=LOAD Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit: BPF prog-id=88 op=LOAD Jul 10 00:58:11.216000 audit: BPF prog-id=46 op=UNLOAD Jul 10 00:58:11.216000 audit: BPF prog-id=47 op=UNLOAD Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit: BPF prog-id=89 op=LOAD Jul 10 00:58:11.216000 audit: BPF prog-id=48 op=UNLOAD Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit: BPF prog-id=90 op=LOAD Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit: BPF prog-id=91 op=LOAD Jul 10 00:58:11.216000 audit: BPF prog-id=49 op=UNLOAD Jul 10 00:58:11.216000 audit: BPF prog-id=50 op=UNLOAD Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.217000 audit: BPF prog-id=92 op=LOAD Jul 10 00:58:11.217000 audit: BPF prog-id=58 op=UNLOAD Jul 10 00:58:11.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.218000 audit: BPF prog-id=93 op=LOAD Jul 10 00:58:11.218000 audit: BPF prog-id=51 op=UNLOAD Jul 10 00:58:11.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.218000 audit: BPF prog-id=94 op=LOAD Jul 10 00:58:11.218000 audit: BPF prog-id=52 op=UNLOAD Jul 10 00:58:11.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.219000 audit: BPF prog-id=95 op=LOAD Jul 10 00:58:11.219000 audit: BPF prog-id=70 op=UNLOAD Jul 10 00:58:11.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.219000 audit: BPF prog-id=96 op=LOAD Jul 10 00:58:11.219000 audit: BPF prog-id=62 op=UNLOAD Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit: BPF prog-id=97 op=LOAD Jul 10 00:58:11.220000 audit: BPF prog-id=53 op=UNLOAD Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit: BPF prog-id=98 op=LOAD Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit: BPF prog-id=99 op=LOAD Jul 10 00:58:11.220000 audit: BPF prog-id=54 op=UNLOAD Jul 10 00:58:11.220000 audit: BPF prog-id=55 op=UNLOAD Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.220000 audit: BPF prog-id=100 op=LOAD Jul 10 00:58:11.220000 audit: BPF prog-id=78 op=UNLOAD Jul 10 00:58:11.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.221000 audit: BPF prog-id=101 op=LOAD Jul 10 00:58:11.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:11.221000 audit: BPF prog-id=102 op=LOAD Jul 10 00:58:11.221000 audit: BPF prog-id=56 op=UNLOAD Jul 10 00:58:11.221000 audit: BPF prog-id=57 op=UNLOAD Jul 10 00:58:11.232349 kubelet[1742]: I0710 00:58:11.231865 1742 dynamic_cafile_content.go:175] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 10 00:58:11.232029 systemd[1]: Stopping kubelet.service... Jul 10 00:58:11.248539 systemd[1]: kubelet.service: Deactivated successfully. Jul 10 00:58:11.248767 systemd[1]: Stopped kubelet.service. Jul 10 00:58:11.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:58:11.250386 systemd[1]: Starting kubelet.service... Jul 10 00:58:12.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:58:12.231596 systemd[1]: Started kubelet.service. Jul 10 00:58:12.308604 kubelet[2097]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 10 00:58:12.308604 kubelet[2097]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Jul 10 00:58:12.308604 kubelet[2097]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 10 00:58:12.308604 kubelet[2097]: I0710 00:58:12.308439 2097 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 10 00:58:12.312628 kubelet[2097]: I0710 00:58:12.312616 2097 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Jul 10 00:58:12.312690 kubelet[2097]: I0710 00:58:12.312682 2097 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 10 00:58:12.312957 kubelet[2097]: I0710 00:58:12.312948 2097 server.go:954] "Client rotation is on, will bootstrap in background" Jul 10 00:58:12.314237 kubelet[2097]: I0710 00:58:12.314227 2097 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Jul 10 00:58:12.325279 kubelet[2097]: I0710 00:58:12.325267 2097 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 10 00:58:12.330973 kubelet[2097]: E0710 00:58:12.330948 2097 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Jul 10 00:58:12.330973 kubelet[2097]: I0710 00:58:12.330971 2097 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Jul 10 00:58:12.335379 kubelet[2097]: I0710 00:58:12.335367 2097 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 10 00:58:12.343679 kubelet[2097]: I0710 00:58:12.343623 2097 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 10 00:58:12.343833 kubelet[2097]: I0710 00:58:12.343728 2097 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Jul 10 00:58:12.343938 kubelet[2097]: I0710 00:58:12.343930 2097 topology_manager.go:138] "Creating topology manager with none policy" Jul 10 00:58:12.343984 kubelet[2097]: I0710 00:58:12.343977 2097 container_manager_linux.go:304] "Creating device plugin manager" Jul 10 00:58:12.344057 kubelet[2097]: I0710 00:58:12.344050 2097 state_mem.go:36] "Initialized new in-memory state store" Jul 10 00:58:12.344191 kubelet[2097]: I0710 00:58:12.344185 2097 kubelet.go:446] "Attempting to sync node with API server" Jul 10 00:58:12.344250 kubelet[2097]: I0710 00:58:12.344243 2097 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 10 00:58:12.344304 kubelet[2097]: I0710 00:58:12.344296 2097 kubelet.go:352] "Adding apiserver pod source" Jul 10 00:58:12.344364 kubelet[2097]: I0710 00:58:12.344357 2097 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 10 00:58:12.355690 kubelet[2097]: I0710 00:58:12.355676 2097 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 10 00:58:12.357449 kubelet[2097]: I0710 00:58:12.357439 2097 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 10 00:58:12.357742 kubelet[2097]: I0710 00:58:12.357734 2097 watchdog_linux.go:99] "Systemd watchdog is not enabled" Jul 10 00:58:12.357801 kubelet[2097]: I0710 00:58:12.357794 2097 server.go:1287] "Started kubelet" Jul 10 00:58:12.375515 kubelet[2097]: I0710 00:58:12.375471 2097 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Jul 10 00:58:12.379502 kubelet[2097]: I0710 00:58:12.379481 2097 server.go:479] "Adding debug handlers to kubelet server" Jul 10 00:58:12.382638 kubelet[2097]: I0710 00:58:12.381080 2097 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 10 00:58:12.382638 kubelet[2097]: I0710 00:58:12.382219 2097 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 10 00:58:12.382000 audit[2097]: AVC avc: denied { mac_admin } for pid=2097 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:12.382000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 10 00:58:12.382000 audit[2097]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000845b60 a1=c00097ea20 a2=c000845b30 a3=25 items=0 ppid=1 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:12.387521 kubelet[2097]: E0710 00:58:12.387482 2097 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 10 00:58:12.382000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 10 00:58:12.387749 kubelet[2097]: I0710 00:58:12.387731 2097 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Jul 10 00:58:12.386000 audit[2097]: AVC avc: denied { mac_admin } for pid=2097 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:12.386000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 10 00:58:12.386000 audit[2097]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00040fa00 a1=c00097ed20 a2=c0004bf710 a3=25 items=0 ppid=1 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:12.386000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 10 00:58:12.388937 kubelet[2097]: I0710 00:58:12.388372 2097 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Jul 10 00:58:12.388937 kubelet[2097]: I0710 00:58:12.388395 2097 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 10 00:58:12.389624 kubelet[2097]: I0710 00:58:12.389377 2097 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Jul 10 00:58:12.389837 kubelet[2097]: I0710 00:58:12.389829 2097 volume_manager.go:297] "Starting Kubelet Volume Manager" Jul 10 00:58:12.390047 kubelet[2097]: I0710 00:58:12.390039 2097 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Jul 10 00:58:12.390746 kubelet[2097]: I0710 00:58:12.390738 2097 reconciler.go:26] "Reconciler: start to sync state" Jul 10 00:58:12.393715 kubelet[2097]: I0710 00:58:12.393699 2097 factory.go:221] Registration of the systemd container factory successfully Jul 10 00:58:12.395080 kubelet[2097]: I0710 00:58:12.394612 2097 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 10 00:58:12.398379 kubelet[2097]: I0710 00:58:12.398363 2097 factory.go:221] Registration of the containerd container factory successfully Jul 10 00:58:12.413864 kubelet[2097]: I0710 00:58:12.413841 2097 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 10 00:58:12.415441 kubelet[2097]: I0710 00:58:12.415213 2097 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 10 00:58:12.415441 kubelet[2097]: I0710 00:58:12.415231 2097 status_manager.go:227] "Starting to sync pod status with apiserver" Jul 10 00:58:12.415441 kubelet[2097]: I0710 00:58:12.415256 2097 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Jul 10 00:58:12.415441 kubelet[2097]: I0710 00:58:12.415262 2097 kubelet.go:2382] "Starting kubelet main sync loop" Jul 10 00:58:12.415441 kubelet[2097]: E0710 00:58:12.415292 2097 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 10 00:58:12.433573 kubelet[2097]: I0710 00:58:12.433559 2097 cpu_manager.go:221] "Starting CPU manager" policy="none" Jul 10 00:58:12.433724 kubelet[2097]: I0710 00:58:12.433715 2097 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Jul 10 00:58:12.433780 kubelet[2097]: I0710 00:58:12.433773 2097 state_mem.go:36] "Initialized new in-memory state store" Jul 10 00:58:12.433906 kubelet[2097]: I0710 00:58:12.433897 2097 state_mem.go:88] "Updated default CPUSet" cpuSet="" Jul 10 00:58:12.433959 kubelet[2097]: I0710 00:58:12.433944 2097 state_mem.go:96] "Updated CPUSet assignments" assignments={} Jul 10 00:58:12.434003 kubelet[2097]: I0710 00:58:12.433996 2097 policy_none.go:49] "None policy: Start" Jul 10 00:58:12.434052 kubelet[2097]: I0710 00:58:12.434045 2097 memory_manager.go:186] "Starting memorymanager" policy="None" Jul 10 00:58:12.434139 kubelet[2097]: I0710 00:58:12.434132 2097 state_mem.go:35] "Initializing new in-memory state store" Jul 10 00:58:12.434246 kubelet[2097]: I0710 00:58:12.434239 2097 state_mem.go:75] "Updated machine memory state" Jul 10 00:58:12.437178 kubelet[2097]: I0710 00:58:12.437164 2097 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 10 00:58:12.435000 audit[2097]: AVC avc: denied { mac_admin } for pid=2097 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:12.435000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 10 00:58:12.435000 audit[2097]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010153b0 a1=c00097f008 a2=c001015380 a3=25 items=0 ppid=1 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:12.435000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 10 00:58:12.437813 kubelet[2097]: I0710 00:58:12.437307 2097 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Jul 10 00:58:12.438066 kubelet[2097]: I0710 00:58:12.438035 2097 eviction_manager.go:189] "Eviction manager: starting control loop" Jul 10 00:58:12.438066 kubelet[2097]: I0710 00:58:12.438046 2097 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 10 00:58:12.438216 kubelet[2097]: I0710 00:58:12.438200 2097 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 10 00:58:12.440290 kubelet[2097]: E0710 00:58:12.440280 2097 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Jul 10 00:58:12.518211 kubelet[2097]: I0710 00:58:12.516369 2097 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" Jul 10 00:58:12.536183 kubelet[2097]: I0710 00:58:12.536165 2097 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" Jul 10 00:58:12.541097 kubelet[2097]: I0710 00:58:12.539540 2097 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" Jul 10 00:58:12.543874 kubelet[2097]: I0710 00:58:12.543863 2097 kubelet_node_status.go:75] "Attempting to register node" node="localhost" Jul 10 00:58:12.548411 kubelet[2097]: I0710 00:58:12.548395 2097 kubelet_node_status.go:124] "Node was previously registered" node="localhost" Jul 10 00:58:12.548531 kubelet[2097]: I0710 00:58:12.548523 2097 kubelet_node_status.go:78] "Successfully registered node" node="localhost" Jul 10 00:58:12.591070 kubelet[2097]: I0710 00:58:12.591046 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d09f4decdcb52906d18749e7887207e2-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"d09f4decdcb52906d18749e7887207e2\") " pod="kube-system/kube-apiserver-localhost" Jul 10 00:58:12.591212 kubelet[2097]: I0710 00:58:12.591198 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d1af03769b64da1b1e8089a7035018fc-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d1af03769b64da1b1e8089a7035018fc\") " pod="kube-system/kube-controller-manager-localhost" Jul 10 00:58:12.591272 kubelet[2097]: I0710 00:58:12.591263 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8a75e163f27396b2168da0f88f85f8a5-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"8a75e163f27396b2168da0f88f85f8a5\") " pod="kube-system/kube-scheduler-localhost" Jul 10 00:58:12.591326 kubelet[2097]: I0710 00:58:12.591317 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d09f4decdcb52906d18749e7887207e2-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"d09f4decdcb52906d18749e7887207e2\") " pod="kube-system/kube-apiserver-localhost" Jul 10 00:58:12.591390 kubelet[2097]: I0710 00:58:12.591381 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d09f4decdcb52906d18749e7887207e2-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"d09f4decdcb52906d18749e7887207e2\") " pod="kube-system/kube-apiserver-localhost" Jul 10 00:58:12.591451 kubelet[2097]: I0710 00:58:12.591436 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d1af03769b64da1b1e8089a7035018fc-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d1af03769b64da1b1e8089a7035018fc\") " pod="kube-system/kube-controller-manager-localhost" Jul 10 00:58:12.591505 kubelet[2097]: I0710 00:58:12.591495 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d1af03769b64da1b1e8089a7035018fc-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d1af03769b64da1b1e8089a7035018fc\") " pod="kube-system/kube-controller-manager-localhost" Jul 10 00:58:12.591568 kubelet[2097]: I0710 00:58:12.591551 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d1af03769b64da1b1e8089a7035018fc-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d1af03769b64da1b1e8089a7035018fc\") " pod="kube-system/kube-controller-manager-localhost" Jul 10 00:58:12.591625 kubelet[2097]: I0710 00:58:12.591615 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d1af03769b64da1b1e8089a7035018fc-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d1af03769b64da1b1e8089a7035018fc\") " pod="kube-system/kube-controller-manager-localhost" Jul 10 00:58:13.345686 kubelet[2097]: I0710 00:58:13.345656 2097 apiserver.go:52] "Watching apiserver" Jul 10 00:58:13.391042 kubelet[2097]: I0710 00:58:13.391015 2097 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Jul 10 00:58:13.432470 kubelet[2097]: I0710 00:58:13.432441 2097 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" Jul 10 00:58:13.432626 kubelet[2097]: I0710 00:58:13.432614 2097 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" Jul 10 00:58:13.436988 kubelet[2097]: E0710 00:58:13.436962 2097 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" Jul 10 00:58:13.437412 kubelet[2097]: E0710 00:58:13.437396 2097 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Jul 10 00:58:13.460673 kubelet[2097]: I0710 00:58:13.460632 2097 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.46061229 podStartE2EDuration="1.46061229s" podCreationTimestamp="2025-07-10 00:58:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-07-10 00:58:13.451778469 +0000 UTC m=+1.201176124" watchObservedRunningTime="2025-07-10 00:58:13.46061229 +0000 UTC m=+1.210009944" Jul 10 00:58:13.471258 kubelet[2097]: I0710 00:58:13.471211 2097 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.471196774 podStartE2EDuration="1.471196774s" podCreationTimestamp="2025-07-10 00:58:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-07-10 00:58:13.461080277 +0000 UTC m=+1.210477932" watchObservedRunningTime="2025-07-10 00:58:13.471196774 +0000 UTC m=+1.220594426" Jul 10 00:58:13.479751 kubelet[2097]: I0710 00:58:13.479713 2097 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.479702045 podStartE2EDuration="1.479702045s" podCreationTimestamp="2025-07-10 00:58:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-07-10 00:58:13.471939046 +0000 UTC m=+1.221336701" watchObservedRunningTime="2025-07-10 00:58:13.479702045 +0000 UTC m=+1.229099700" Jul 10 00:58:13.549000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=7350 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 10 00:58:13.549000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000603340 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 00:58:13.549000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 00:58:14.349000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:58:14.349000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013bdbe0 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 00:58:14.349000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 00:58:14.350000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:58:14.350000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013bdda0 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 00:58:14.350000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 00:58:14.350000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:58:14.350000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014ae120 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 00:58:14.350000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 00:58:14.350000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:58:14.350000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014ae160 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 00:58:14.350000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 00:58:17.536236 kubelet[2097]: I0710 00:58:17.536213 2097 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Jul 10 00:58:17.536843 env[1248]: time="2025-07-10T00:58:17.536798102Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 10 00:58:17.537132 kubelet[2097]: I0710 00:58:17.537120 2097 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Jul 10 00:58:18.128589 systemd[1]: Created slice kubepods-besteffort-pod2f567548_48e0_4afe_80f3_cd2b40066a69.slice. Jul 10 00:58:18.227669 kubelet[2097]: I0710 00:58:18.227645 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/2f567548-48e0-4afe-80f3-cd2b40066a69-kube-proxy\") pod \"kube-proxy-wwwvd\" (UID: \"2f567548-48e0-4afe-80f3-cd2b40066a69\") " pod="kube-system/kube-proxy-wwwvd" Jul 10 00:58:18.227832 kubelet[2097]: I0710 00:58:18.227817 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2f567548-48e0-4afe-80f3-cd2b40066a69-xtables-lock\") pod \"kube-proxy-wwwvd\" (UID: \"2f567548-48e0-4afe-80f3-cd2b40066a69\") " pod="kube-system/kube-proxy-wwwvd" Jul 10 00:58:18.227913 kubelet[2097]: I0710 00:58:18.227901 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2f567548-48e0-4afe-80f3-cd2b40066a69-lib-modules\") pod \"kube-proxy-wwwvd\" (UID: \"2f567548-48e0-4afe-80f3-cd2b40066a69\") " pod="kube-system/kube-proxy-wwwvd" Jul 10 00:58:18.228003 kubelet[2097]: I0710 00:58:18.227989 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9z4qt\" (UniqueName: \"kubernetes.io/projected/2f567548-48e0-4afe-80f3-cd2b40066a69-kube-api-access-9z4qt\") pod \"kube-proxy-wwwvd\" (UID: \"2f567548-48e0-4afe-80f3-cd2b40066a69\") " pod="kube-system/kube-proxy-wwwvd" Jul 10 00:58:18.333783 kubelet[2097]: I0710 00:58:18.333754 2097 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Jul 10 00:58:18.434627 env[1248]: time="2025-07-10T00:58:18.434503159Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wwwvd,Uid:2f567548-48e0-4afe-80f3-cd2b40066a69,Namespace:kube-system,Attempt:0,}" Jul 10 00:58:18.448516 env[1248]: time="2025-07-10T00:58:18.448474593Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:58:18.448673 env[1248]: time="2025-07-10T00:58:18.448647549Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:58:18.448774 env[1248]: time="2025-07-10T00:58:18.448752977Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:58:18.448987 env[1248]: time="2025-07-10T00:58:18.448967224Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d52a92f9393a3626b642697e00c66dd2e281d3f0ad3d0d693d7852ecaef2470c pid=2148 runtime=io.containerd.runc.v2 Jul 10 00:58:18.464901 systemd[1]: Started cri-containerd-d52a92f9393a3626b642697e00c66dd2e281d3f0ad3d0d693d7852ecaef2470c.scope. Jul 10 00:58:18.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.477531 kernel: kauditd_printk_skb: 263 callbacks suppressed Jul 10 00:58:18.477570 kernel: audit: type=1400 audit(1752109098.475:793): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.482283 kernel: audit: type=1400 audit(1752109098.475:794): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.487203 kernel: audit: type=1400 audit(1752109098.481:795): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.487233 kernel: audit: type=1400 audit(1752109098.481:796): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.494673 kernel: audit: type=1400 audit(1752109098.481:797): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.494707 kernel: audit: type=1400 audit(1752109098.481:798): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.497303 kernel: audit: type=1400 audit(1752109098.481:799): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.500352 kernel: audit: type=1400 audit(1752109098.481:800): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.500388 kernel: audit: type=1400 audit(1752109098.481:801): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.481000 audit: BPF prog-id=103 op=LOAD Jul 10 00:58:18.481000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.481000 audit[2158]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2148 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:18.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435326139326639333933613336323662363432363937653030633636 Jul 10 00:58:18.481000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.481000 audit[2158]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2148 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:18.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435326139326639333933613336323662363432363937653030633636 Jul 10 00:58:18.481000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.506384 kernel: audit: type=1400 audit(1752109098.481:802): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.481000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.481000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.481000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.481000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.481000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.481000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.481000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.481000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.481000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.481000 audit: BPF prog-id=104 op=LOAD Jul 10 00:58:18.481000 audit[2158]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000250b50 items=0 ppid=2148 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:18.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435326139326639333933613336323662363432363937653030633636 Jul 10 00:58:18.483000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.483000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.483000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.483000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.483000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.483000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.483000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.483000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.483000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.483000 audit: BPF prog-id=105 op=LOAD Jul 10 00:58:18.483000 audit[2158]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000250b98 items=0 ppid=2148 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:18.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435326139326639333933613336323662363432363937653030633636 Jul 10 00:58:18.486000 audit: BPF prog-id=105 op=UNLOAD Jul 10 00:58:18.486000 audit: BPF prog-id=104 op=UNLOAD Jul 10 00:58:18.486000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.486000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.486000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.486000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.486000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.486000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.486000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.486000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.486000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.486000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.486000 audit: BPF prog-id=106 op=LOAD Jul 10 00:58:18.486000 audit[2158]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000250fa8 items=0 ppid=2148 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:18.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435326139326639333933613336323662363432363937653030633636 Jul 10 00:58:18.513044 env[1248]: time="2025-07-10T00:58:18.512998805Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wwwvd,Uid:2f567548-48e0-4afe-80f3-cd2b40066a69,Namespace:kube-system,Attempt:0,} returns sandbox id \"d52a92f9393a3626b642697e00c66dd2e281d3f0ad3d0d693d7852ecaef2470c\"" Jul 10 00:58:18.515172 env[1248]: time="2025-07-10T00:58:18.515133027Z" level=info msg="CreateContainer within sandbox \"d52a92f9393a3626b642697e00c66dd2e281d3f0ad3d0d693d7852ecaef2470c\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 10 00:58:18.522525 env[1248]: time="2025-07-10T00:58:18.522501909Z" level=info msg="CreateContainer within sandbox \"d52a92f9393a3626b642697e00c66dd2e281d3f0ad3d0d693d7852ecaef2470c\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"ec79a3282256f0f83d4e8ea62774685e7e55854ab9e8ef34b8d2e8be601b6c95\"" Jul 10 00:58:18.523109 env[1248]: time="2025-07-10T00:58:18.522775014Z" level=info msg="StartContainer for \"ec79a3282256f0f83d4e8ea62774685e7e55854ab9e8ef34b8d2e8be601b6c95\"" Jul 10 00:58:18.533303 systemd[1]: Started cri-containerd-ec79a3282256f0f83d4e8ea62774685e7e55854ab9e8ef34b8d2e8be601b6c95.scope. Jul 10 00:58:18.544000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.544000 audit[2189]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7f78289518 items=0 ppid=2148 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:18.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563373961333238323235366630663833643465386561363237373436 Jul 10 00:58:18.544000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.544000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.544000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.544000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.544000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.544000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.544000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.544000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.544000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.544000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.544000 audit: BPF prog-id=107 op=LOAD Jul 10 00:58:18.544000 audit[2189]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00027dba8 items=0 ppid=2148 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:18.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563373961333238323235366630663833643465386561363237373436 Jul 10 00:58:18.545000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.545000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.545000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.545000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.545000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.545000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.545000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.545000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.545000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.545000 audit: BPF prog-id=108 op=LOAD Jul 10 00:58:18.545000 audit[2189]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00027dbf8 items=0 ppid=2148 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:18.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563373961333238323235366630663833643465386561363237373436 Jul 10 00:58:18.545000 audit: BPF prog-id=108 op=UNLOAD Jul 10 00:58:18.545000 audit: BPF prog-id=107 op=UNLOAD Jul 10 00:58:18.545000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.545000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.545000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.545000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.545000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.545000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.545000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.545000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.545000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.545000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.545000 audit: BPF prog-id=109 op=LOAD Jul 10 00:58:18.545000 audit[2189]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00027dc88 items=0 ppid=2148 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:18.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563373961333238323235366630663833643465386561363237373436 Jul 10 00:58:18.579449 env[1248]: time="2025-07-10T00:58:18.579415081Z" level=info msg="StartContainer for \"ec79a3282256f0f83d4e8ea62774685e7e55854ab9e8ef34b8d2e8be601b6c95\" returns successfully" Jul 10 00:58:18.584087 systemd[1]: Created slice kubepods-besteffort-pod69078507_2748_47d1_8c8b_299a68e6587d.slice. Jul 10 00:58:18.630301 kubelet[2097]: I0710 00:58:18.630265 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/69078507-2748-47d1-8c8b-299a68e6587d-var-lib-calico\") pod \"tigera-operator-747864d56d-dhj8c\" (UID: \"69078507-2748-47d1-8c8b-299a68e6587d\") " pod="tigera-operator/tigera-operator-747864d56d-dhj8c" Jul 10 00:58:18.630606 kubelet[2097]: I0710 00:58:18.630376 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2k6zf\" (UniqueName: \"kubernetes.io/projected/69078507-2748-47d1-8c8b-299a68e6587d-kube-api-access-2k6zf\") pod \"tigera-operator-747864d56d-dhj8c\" (UID: \"69078507-2748-47d1-8c8b-299a68e6587d\") " pod="tigera-operator/tigera-operator-747864d56d-dhj8c" Jul 10 00:58:18.886945 env[1248]: time="2025-07-10T00:58:18.886909572Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-747864d56d-dhj8c,Uid:69078507-2748-47d1-8c8b-299a68e6587d,Namespace:tigera-operator,Attempt:0,}" Jul 10 00:58:18.901834 env[1248]: time="2025-07-10T00:58:18.901730219Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:58:18.901834 env[1248]: time="2025-07-10T00:58:18.901771897Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:58:18.901834 env[1248]: time="2025-07-10T00:58:18.901781621Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:58:18.902130 env[1248]: time="2025-07-10T00:58:18.902091041Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/51374a0cd67bd921ec38b2b37b5079330970ab74749cb7509a3f1e470dd12f01 pid=2225 runtime=io.containerd.runc.v2 Jul 10 00:58:18.916738 systemd[1]: Started cri-containerd-51374a0cd67bd921ec38b2b37b5079330970ab74749cb7509a3f1e470dd12f01.scope. Jul 10 00:58:18.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit: BPF prog-id=110 op=LOAD Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2225 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:18.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531333734613063643637626439323165633338623262333762353037 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2225 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:18.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531333734613063643637626439323165633338623262333762353037 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit: BPF prog-id=111 op=LOAD Jul 10 00:58:18.926000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000217f80 items=0 ppid=2225 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:18.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531333734613063643637626439323165633338623262333762353037 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit: BPF prog-id=112 op=LOAD Jul 10 00:58:18.926000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000217fc8 items=0 ppid=2225 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:18.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531333734613063643637626439323165633338623262333762353037 Jul 10 00:58:18.926000 audit: BPF prog-id=112 op=UNLOAD Jul 10 00:58:18.926000 audit: BPF prog-id=111 op=UNLOAD Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:18.926000 audit: BPF prog-id=113 op=LOAD Jul 10 00:58:18.926000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00023c3d8 items=0 ppid=2225 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:18.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531333734613063643637626439323165633338623262333762353037 Jul 10 00:58:18.950067 env[1248]: time="2025-07-10T00:58:18.950042444Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-747864d56d-dhj8c,Uid:69078507-2748-47d1-8c8b-299a68e6587d,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"51374a0cd67bd921ec38b2b37b5079330970ab74749cb7509a3f1e470dd12f01\"" Jul 10 00:58:18.954137 env[1248]: time="2025-07-10T00:58:18.954020297Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.3\"" Jul 10 00:58:19.120000 audit[2290]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:19.120000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce420d820 a2=0 a3=7ffce420d80c items=0 ppid=2201 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.120000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 10 00:58:19.121000 audit[2291]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.121000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd5b7c9a20 a2=0 a3=7ffd5b7c9a0c items=0 ppid=2201 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.121000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 10 00:58:19.123000 audit[2292]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:19.123000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf1dcae40 a2=0 a3=7ffdf1dcae2c items=0 ppid=2201 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.123000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 10 00:58:19.124000 audit[2294]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.124000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd1480ca0 a2=0 a3=7ffdd1480c8c items=0 ppid=2201 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.124000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 10 00:58:19.125000 audit[2295]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:19.125000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe370b27b0 a2=0 a3=7ffe370b279c items=0 ppid=2201 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.125000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 10 00:58:19.131000 audit[2296]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.131000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe70402460 a2=0 a3=7ffe7040244c items=0 ppid=2201 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.131000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 10 00:58:19.232000 audit[2297]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:19.232000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff135fd380 a2=0 a3=7fff135fd36c items=0 ppid=2201 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.232000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 10 00:58:19.235000 audit[2299]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:19.235000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff84959b60 a2=0 a3=7fff84959b4c items=0 ppid=2201 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.235000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 10 00:58:19.238000 audit[2302]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:19.238000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff79965430 a2=0 a3=7fff7996541c items=0 ppid=2201 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.238000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 10 00:58:19.238000 audit[2303]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:19.238000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcfcf376d0 a2=0 a3=7ffcfcf376bc items=0 ppid=2201 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.238000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 10 00:58:19.240000 audit[2305]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2305 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:19.240000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc74a9c550 a2=0 a3=7ffc74a9c53c items=0 ppid=2201 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.240000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 10 00:58:19.241000 audit[2306]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:19.241000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffdbebcca0 a2=0 a3=7fffdbebcc8c items=0 ppid=2201 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.241000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 10 00:58:19.242000 audit[2308]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:19.242000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffee82e08e0 a2=0 a3=7ffee82e08cc items=0 ppid=2201 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.242000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 10 00:58:19.245000 audit[2311]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:19.245000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcbedde1f0 a2=0 a3=7ffcbedde1dc items=0 ppid=2201 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.245000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 10 00:58:19.245000 audit[2312]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:19.245000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc09115d10 a2=0 a3=7ffc09115cfc items=0 ppid=2201 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.245000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 10 00:58:19.247000 audit[2314]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:19.247000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffedf2afb20 a2=0 a3=7ffedf2afb0c items=0 ppid=2201 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.247000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 10 00:58:19.248000 audit[2315]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:19.248000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd59bfcc70 a2=0 a3=7ffd59bfcc5c items=0 ppid=2201 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.248000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 10 00:58:19.249000 audit[2317]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:19.249000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeceffa3b0 a2=0 a3=7ffeceffa39c items=0 ppid=2201 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.249000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 10 00:58:19.252000 audit[2320]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:19.252000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcc9f52730 a2=0 a3=7ffcc9f5271c items=0 ppid=2201 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.252000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 10 00:58:19.254000 audit[2323]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:19.254000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff19f36df0 a2=0 a3=7fff19f36ddc items=0 ppid=2201 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.254000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 10 00:58:19.255000 audit[2324]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:19.255000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc4b67ff00 a2=0 a3=7ffc4b67feec items=0 ppid=2201 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.255000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 10 00:58:19.257000 audit[2326]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:19.257000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffce103c1d0 a2=0 a3=7ffce103c1bc items=0 ppid=2201 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.257000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 10 00:58:19.259000 audit[2329]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:19.259000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe7905c820 a2=0 a3=7ffe7905c80c items=0 ppid=2201 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.259000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 10 00:58:19.260000 audit[2330]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:19.260000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2e96e0e0 a2=0 a3=7fff2e96e0cc items=0 ppid=2201 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.260000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 10 00:58:19.262000 audit[2332]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:58:19.262000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffff9ff1bd0 a2=0 a3=7ffff9ff1bbc items=0 ppid=2201 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.262000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 10 00:58:19.286000 audit[2338]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:58:19.286000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe37d891a0 a2=0 a3=7ffe37d8918c items=0 ppid=2201 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.286000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:58:19.294000 audit[2338]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:58:19.294000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffe37d891a0 a2=0 a3=7ffe37d8918c items=0 ppid=2201 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.294000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:58:19.295000 audit[2343]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.295000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe7620a640 a2=0 a3=7ffe7620a62c items=0 ppid=2201 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.295000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 10 00:58:19.296000 audit[2345]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.296000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc4ce19680 a2=0 a3=7ffc4ce1966c items=0 ppid=2201 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.296000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 10 00:58:19.299000 audit[2348]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.299000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd54448e10 a2=0 a3=7ffd54448dfc items=0 ppid=2201 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.299000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 10 00:58:19.300000 audit[2349]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.300000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda42a66c0 a2=0 a3=7ffda42a66ac items=0 ppid=2201 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.300000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 10 00:58:19.302000 audit[2351]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2351 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.302000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe3ed942e0 a2=0 a3=7ffe3ed942cc items=0 ppid=2201 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.302000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 10 00:58:19.303000 audit[2352]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.303000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7c493730 a2=0 a3=7ffc7c49371c items=0 ppid=2201 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.303000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 10 00:58:19.305000 audit[2354]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2354 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.305000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd49d3a590 a2=0 a3=7ffd49d3a57c items=0 ppid=2201 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.305000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 10 00:58:19.308000 audit[2357]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2357 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.308000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcc35675e0 a2=0 a3=7ffcc35675cc items=0 ppid=2201 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.308000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 10 00:58:19.308000 audit[2358]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.308000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe777d20e0 a2=0 a3=7ffe777d20cc items=0 ppid=2201 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.308000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 10 00:58:19.310000 audit[2360]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2360 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.310000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd2d16ad0 a2=0 a3=7fffd2d16abc items=0 ppid=2201 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.310000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 10 00:58:19.311000 audit[2361]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.311000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1793ad60 a2=0 a3=7fff1793ad4c items=0 ppid=2201 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.311000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 10 00:58:19.313000 audit[2363]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2363 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.313000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd47adac80 a2=0 a3=7ffd47adac6c items=0 ppid=2201 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.313000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 10 00:58:19.316000 audit[2366]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.316000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc2cfa7c20 a2=0 a3=7ffc2cfa7c0c items=0 ppid=2201 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.316000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 10 00:58:19.318000 audit[2369]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2369 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.318000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe3ceb8bd0 a2=0 a3=7ffe3ceb8bbc items=0 ppid=2201 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.318000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 10 00:58:19.319000 audit[2370]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.319000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff156f3c60 a2=0 a3=7fff156f3c4c items=0 ppid=2201 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.319000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 10 00:58:19.321000 audit[2372]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.321000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff48bd76d0 a2=0 a3=7fff48bd76bc items=0 ppid=2201 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.321000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 10 00:58:19.323000 audit[2375]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.323000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffced63dc50 a2=0 a3=7ffced63dc3c items=0 ppid=2201 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.323000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 10 00:58:19.324000 audit[2376]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.324000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd230031e0 a2=0 a3=7ffd230031cc items=0 ppid=2201 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 10 00:58:19.325000 audit[2378]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.325000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffda2f4ee90 a2=0 a3=7ffda2f4ee7c items=0 ppid=2201 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.325000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 10 00:58:19.326000 audit[2379]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.326000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe05cbb430 a2=0 a3=7ffe05cbb41c items=0 ppid=2201 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.326000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 10 00:58:19.327000 audit[2381]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2381 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.327000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd24fc65b0 a2=0 a3=7ffd24fc659c items=0 ppid=2201 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.327000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 10 00:58:19.330000 audit[2384]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:58:19.330000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc380d8730 a2=0 a3=7ffc380d871c items=0 ppid=2201 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.330000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 10 00:58:19.332000 audit[2386]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 10 00:58:19.332000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffc970d8000 a2=0 a3=7ffc970d7fec items=0 ppid=2201 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.332000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:58:19.332000 audit[2386]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 10 00:58:19.332000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc970d8000 a2=0 a3=7ffc970d7fec items=0 ppid=2201 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:19.332000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:58:19.342858 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount682402042.mount: Deactivated successfully. Jul 10 00:58:20.271316 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2565540015.mount: Deactivated successfully. Jul 10 00:58:21.203360 env[1248]: time="2025-07-10T00:58:21.203299704Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:21.204182 env[1248]: time="2025-07-10T00:58:21.204158950Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8bde16470b09d1963e19456806d73180c9778a6c2b3c1fda2335c67c1cd4ce93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:21.205149 env[1248]: time="2025-07-10T00:58:21.205128911Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:21.206090 env[1248]: time="2025-07-10T00:58:21.206068318Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:dbf1bad0def7b5955dc8e4aeee96e23ead0bc5822f6872518e685cd0ed484121,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:21.206576 env[1248]: time="2025-07-10T00:58:21.206560609Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.3\" returns image reference \"sha256:8bde16470b09d1963e19456806d73180c9778a6c2b3c1fda2335c67c1cd4ce93\"" Jul 10 00:58:21.210478 env[1248]: time="2025-07-10T00:58:21.210443927Z" level=info msg="CreateContainer within sandbox \"51374a0cd67bd921ec38b2b37b5079330970ab74749cb7509a3f1e470dd12f01\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Jul 10 00:58:21.216890 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1773843184.mount: Deactivated successfully. Jul 10 00:58:21.220771 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount985481295.mount: Deactivated successfully. Jul 10 00:58:21.227144 env[1248]: time="2025-07-10T00:58:21.227109233Z" level=info msg="CreateContainer within sandbox \"51374a0cd67bd921ec38b2b37b5079330970ab74749cb7509a3f1e470dd12f01\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"663c36b4eded040db8a2cde1c98e6c2b557e9979d922675973e996efd7ffa3bc\"" Jul 10 00:58:21.228185 env[1248]: time="2025-07-10T00:58:21.227563829Z" level=info msg="StartContainer for \"663c36b4eded040db8a2cde1c98e6c2b557e9979d922675973e996efd7ffa3bc\"" Jul 10 00:58:21.245441 systemd[1]: Started cri-containerd-663c36b4eded040db8a2cde1c98e6c2b557e9979d922675973e996efd7ffa3bc.scope. Jul 10 00:58:21.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.257000 audit: BPF prog-id=114 op=LOAD Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2225 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:21.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636336333366234656465643034306462386132636465316339386536 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2225 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:21.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636336333366234656465643034306462386132636465316339386536 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit: BPF prog-id=115 op=LOAD Jul 10 00:58:21.258000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002ad8e0 items=0 ppid=2225 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:21.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636336333366234656465643034306462386132636465316339386536 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit: BPF prog-id=116 op=LOAD Jul 10 00:58:21.258000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002ad928 items=0 ppid=2225 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:21.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636336333366234656465643034306462386132636465316339386536 Jul 10 00:58:21.258000 audit: BPF prog-id=116 op=UNLOAD Jul 10 00:58:21.258000 audit: BPF prog-id=115 op=UNLOAD Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:21.258000 audit: BPF prog-id=117 op=LOAD Jul 10 00:58:21.258000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002add38 items=0 ppid=2225 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:21.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636336333366234656465643034306462386132636465316339386536 Jul 10 00:58:21.275869 env[1248]: time="2025-07-10T00:58:21.275830857Z" level=info msg="StartContainer for \"663c36b4eded040db8a2cde1c98e6c2b557e9979d922675973e996efd7ffa3bc\" returns successfully" Jul 10 00:58:21.462038 kubelet[2097]: I0710 00:58:21.461941 2097 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-wwwvd" podStartSLOduration=3.461926722 podStartE2EDuration="3.461926722s" podCreationTimestamp="2025-07-10 00:58:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-07-10 00:58:19.459505777 +0000 UTC m=+7.208903432" watchObservedRunningTime="2025-07-10 00:58:21.461926722 +0000 UTC m=+9.211324383" Jul 10 00:58:21.463182 kubelet[2097]: I0710 00:58:21.463146 2097 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-747864d56d-dhj8c" podStartSLOduration=1.208399787 podStartE2EDuration="3.463136207s" podCreationTimestamp="2025-07-10 00:58:18 +0000 UTC" firstStartedPulling="2025-07-10 00:58:18.952888301 +0000 UTC m=+6.702285955" lastFinishedPulling="2025-07-10 00:58:21.20762472 +0000 UTC m=+8.957022375" observedRunningTime="2025-07-10 00:58:21.462615678 +0000 UTC m=+9.212013342" watchObservedRunningTime="2025-07-10 00:58:21.463136207 +0000 UTC m=+9.212533882" Jul 10 00:58:22.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.109:22-14.103.115.212:50064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:58:22.769018 systemd[1]: Started sshd@7-139.178.70.109:22-14.103.115.212:50064.service. Jul 10 00:58:25.092651 sshd[2427]: Invalid user support from 14.103.115.212 port 50064 Jul 10 00:58:25.096676 sshd[2427]: pam_faillock(sshd:auth): User unknown Jul 10 00:58:25.097895 sshd[2427]: pam_unix(sshd:auth): check pass; user unknown Jul 10 00:58:25.097924 sshd[2427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.103.115.212 Jul 10 00:58:25.098207 sshd[2427]: pam_faillock(sshd:auth): User unknown Jul 10 00:58:25.100379 kernel: kauditd_printk_skb: 358 callbacks suppressed Jul 10 00:58:25.101020 kernel: audit: type=1100 audit(1752109105.096:905): pid=2427 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="support" exe="/usr/sbin/sshd" hostname=14.103.115.212 addr=14.103.115.212 terminal=ssh res=failed' Jul 10 00:58:25.096000 audit[2427]: USER_AUTH pid=2427 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="support" exe="/usr/sbin/sshd" hostname=14.103.115.212 addr=14.103.115.212 terminal=ssh res=failed' Jul 10 00:58:27.021000 audit[1473]: USER_END pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:58:27.022503 sudo[1473]: pam_unix(sudo:session): session closed for user root Jul 10 00:58:27.021000 audit[1473]: CRED_DISP pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:58:27.028487 kernel: audit: type=1106 audit(1752109107.021:906): pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:58:27.028530 kernel: audit: type=1104 audit(1752109107.021:907): pid=1473 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:58:27.031484 sshd[1469]: pam_unix(sshd:session): session closed for user core Jul 10 00:58:27.032000 audit[1469]: USER_END pid=1469 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:58:27.038096 systemd[1]: sshd@6-139.178.70.109:22-139.178.68.195:45338.service: Deactivated successfully. Jul 10 00:58:27.038342 kernel: audit: type=1106 audit(1752109107.032:908): pid=1469 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:58:27.038624 systemd[1]: session-9.scope: Deactivated successfully. Jul 10 00:58:27.038718 systemd[1]: session-9.scope: Consumed 2.664s CPU time. Jul 10 00:58:27.032000 audit[1469]: CRED_DISP pid=1469 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:58:27.042552 kernel: audit: type=1104 audit(1752109107.032:909): pid=1469 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:58:27.042143 systemd-logind[1239]: Session 9 logged out. Waiting for processes to exit. Jul 10 00:58:27.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.109:22-139.178.68.195:45338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:58:27.043157 systemd-logind[1239]: Removed session 9. Jul 10 00:58:27.046352 kernel: audit: type=1131 audit(1752109107.036:910): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.109:22-139.178.68.195:45338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:58:27.522000 audit[2476]: NETFILTER_CFG table=filter:89 family=2 entries=14 op=nft_register_rule pid=2476 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:58:27.522000 audit[2476]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffdb90642f0 a2=0 a3=7ffdb90642dc items=0 ppid=2201 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:27.529421 kernel: audit: type=1325 audit(1752109107.522:911): table=filter:89 family=2 entries=14 op=nft_register_rule pid=2476 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:58:27.535152 kernel: audit: type=1300 audit(1752109107.522:911): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffdb90642f0 a2=0 a3=7ffdb90642dc items=0 ppid=2201 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:27.535199 kernel: audit: type=1327 audit(1752109107.522:911): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:58:27.535215 kernel: audit: type=1325 audit(1752109107.531:912): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2476 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:58:27.522000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:58:27.531000 audit[2476]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2476 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:58:27.531000 audit[2476]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdb90642f0 a2=0 a3=0 items=0 ppid=2201 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:27.531000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:58:27.546000 audit[2478]: NETFILTER_CFG table=filter:91 family=2 entries=15 op=nft_register_rule pid=2478 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:58:27.546000 audit[2478]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe8043f3c0 a2=0 a3=7ffe8043f3ac items=0 ppid=2201 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:27.546000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:58:27.551000 audit[2478]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2478 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:58:27.551000 audit[2478]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe8043f3c0 a2=0 a3=0 items=0 ppid=2201 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:27.551000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:58:27.641462 sshd[2427]: Failed password for invalid user support from 14.103.115.212 port 50064 ssh2 Jul 10 00:58:28.864591 sshd[2427]: Received disconnect from 14.103.115.212 port 50064:11: Bye Bye [preauth] Jul 10 00:58:28.864591 sshd[2427]: Disconnected from invalid user support 14.103.115.212 port 50064 [preauth] Jul 10 00:58:28.864770 systemd[1]: sshd@7-139.178.70.109:22-14.103.115.212:50064.service: Deactivated successfully. Jul 10 00:58:28.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.109:22-14.103.115.212:50064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:58:28.925000 audit[2481]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2481 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:58:28.925000 audit[2481]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fff9f837a90 a2=0 a3=7fff9f837a7c items=0 ppid=2201 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:28.925000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:58:28.930000 audit[2481]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2481 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:58:28.930000 audit[2481]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff9f837a90 a2=0 a3=0 items=0 ppid=2201 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:28.930000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:58:29.188223 systemd[1]: Created slice kubepods-besteffort-podcd9586b9_18eb_461c_bb6e_6f0486f8487a.slice. Jul 10 00:58:29.193041 kubelet[2097]: I0710 00:58:29.193012 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/cd9586b9-18eb-461c-bb6e-6f0486f8487a-typha-certs\") pod \"calico-typha-76889d5858-s2c6p\" (UID: \"cd9586b9-18eb-461c-bb6e-6f0486f8487a\") " pod="calico-system/calico-typha-76889d5858-s2c6p" Jul 10 00:58:29.193320 kubelet[2097]: I0710 00:58:29.193048 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cd9586b9-18eb-461c-bb6e-6f0486f8487a-tigera-ca-bundle\") pod \"calico-typha-76889d5858-s2c6p\" (UID: \"cd9586b9-18eb-461c-bb6e-6f0486f8487a\") " pod="calico-system/calico-typha-76889d5858-s2c6p" Jul 10 00:58:29.193320 kubelet[2097]: I0710 00:58:29.193065 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lhd28\" (UniqueName: \"kubernetes.io/projected/cd9586b9-18eb-461c-bb6e-6f0486f8487a-kube-api-access-lhd28\") pod \"calico-typha-76889d5858-s2c6p\" (UID: \"cd9586b9-18eb-461c-bb6e-6f0486f8487a\") " pod="calico-system/calico-typha-76889d5858-s2c6p" Jul 10 00:58:29.498174 env[1248]: time="2025-07-10T00:58:29.497683356Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-76889d5858-s2c6p,Uid:cd9586b9-18eb-461c-bb6e-6f0486f8487a,Namespace:calico-system,Attempt:0,}" Jul 10 00:58:29.538008 env[1248]: time="2025-07-10T00:58:29.537959927Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:58:29.538008 env[1248]: time="2025-07-10T00:58:29.537989129Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:58:29.538155 env[1248]: time="2025-07-10T00:58:29.538130483Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:58:29.538296 env[1248]: time="2025-07-10T00:58:29.538269178Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b17296c3242f4417f207b2608c1d4f96b7147ec79c3788f126f2efd178a8fbe6 pid=2491 runtime=io.containerd.runc.v2 Jul 10 00:58:29.551514 systemd[1]: Started cri-containerd-b17296c3242f4417f207b2608c1d4f96b7147ec79c3788f126f2efd178a8fbe6.scope. Jul 10 00:58:29.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.571000 audit: BPF prog-id=118 op=LOAD Jul 10 00:58:29.572000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.572000 audit[2501]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2491 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:29.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231373239366333323432663434313766323037623236303863316434 Jul 10 00:58:29.572000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.572000 audit[2501]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2491 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:29.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231373239366333323432663434313766323037623236303863316434 Jul 10 00:58:29.572000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.572000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.572000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.572000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.572000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.572000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.572000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.572000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.572000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.572000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.572000 audit: BPF prog-id=119 op=LOAD Jul 10 00:58:29.572000 audit[2501]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002171b0 items=0 ppid=2491 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:29.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231373239366333323432663434313766323037623236303863316434 Jul 10 00:58:29.573000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.573000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.573000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.573000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.573000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.573000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.573000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.573000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.573000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.573000 audit: BPF prog-id=120 op=LOAD Jul 10 00:58:29.573000 audit[2501]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002171f8 items=0 ppid=2491 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:29.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231373239366333323432663434313766323037623236303863316434 Jul 10 00:58:29.573000 audit: BPF prog-id=120 op=UNLOAD Jul 10 00:58:29.573000 audit: BPF prog-id=119 op=UNLOAD Jul 10 00:58:29.573000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.573000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.573000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.573000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.573000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.573000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.573000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.573000 audit[2501]: AVC avc: denied { perfmon } for pid=2501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.573000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.573000 audit[2501]: AVC avc: denied { bpf } for pid=2501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:29.573000 audit: BPF prog-id=121 op=LOAD Jul 10 00:58:29.573000 audit[2501]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000217608 items=0 ppid=2491 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:29.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231373239366333323432663434313766323037623236303863316434 Jul 10 00:58:29.604955 env[1248]: time="2025-07-10T00:58:29.604013851Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-76889d5858-s2c6p,Uid:cd9586b9-18eb-461c-bb6e-6f0486f8487a,Namespace:calico-system,Attempt:0,} returns sandbox id \"b17296c3242f4417f207b2608c1d4f96b7147ec79c3788f126f2efd178a8fbe6\"" Jul 10 00:58:29.605197 env[1248]: time="2025-07-10T00:58:29.605176855Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.2\"" Jul 10 00:58:29.697265 systemd[1]: Created slice kubepods-besteffort-pod616ea664_5bfe_4d4d_b071_442f25382da7.slice. Jul 10 00:58:29.796448 kubelet[2097]: I0710 00:58:29.796319 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/616ea664-5bfe-4d4d-b071-442f25382da7-tigera-ca-bundle\") pod \"calico-node-5w498\" (UID: \"616ea664-5bfe-4d4d-b071-442f25382da7\") " pod="calico-system/calico-node-5w498" Jul 10 00:58:29.796448 kubelet[2097]: I0710 00:58:29.796360 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/616ea664-5bfe-4d4d-b071-442f25382da7-cni-log-dir\") pod \"calico-node-5w498\" (UID: \"616ea664-5bfe-4d4d-b071-442f25382da7\") " pod="calico-system/calico-node-5w498" Jul 10 00:58:29.796448 kubelet[2097]: I0710 00:58:29.796373 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/616ea664-5bfe-4d4d-b071-442f25382da7-var-run-calico\") pod \"calico-node-5w498\" (UID: \"616ea664-5bfe-4d4d-b071-442f25382da7\") " pod="calico-system/calico-node-5w498" Jul 10 00:58:29.796448 kubelet[2097]: I0710 00:58:29.796385 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qsn8d\" (UniqueName: \"kubernetes.io/projected/616ea664-5bfe-4d4d-b071-442f25382da7-kube-api-access-qsn8d\") pod \"calico-node-5w498\" (UID: \"616ea664-5bfe-4d4d-b071-442f25382da7\") " pod="calico-system/calico-node-5w498" Jul 10 00:58:29.796448 kubelet[2097]: I0710 00:58:29.796396 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/616ea664-5bfe-4d4d-b071-442f25382da7-flexvol-driver-host\") pod \"calico-node-5w498\" (UID: \"616ea664-5bfe-4d4d-b071-442f25382da7\") " pod="calico-system/calico-node-5w498" Jul 10 00:58:29.796612 kubelet[2097]: I0710 00:58:29.796405 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/616ea664-5bfe-4d4d-b071-442f25382da7-policysync\") pod \"calico-node-5w498\" (UID: \"616ea664-5bfe-4d4d-b071-442f25382da7\") " pod="calico-system/calico-node-5w498" Jul 10 00:58:29.796612 kubelet[2097]: I0710 00:58:29.796423 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/616ea664-5bfe-4d4d-b071-442f25382da7-xtables-lock\") pod \"calico-node-5w498\" (UID: \"616ea664-5bfe-4d4d-b071-442f25382da7\") " pod="calico-system/calico-node-5w498" Jul 10 00:58:29.796612 kubelet[2097]: I0710 00:58:29.796435 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/616ea664-5bfe-4d4d-b071-442f25382da7-var-lib-calico\") pod \"calico-node-5w498\" (UID: \"616ea664-5bfe-4d4d-b071-442f25382da7\") " pod="calico-system/calico-node-5w498" Jul 10 00:58:29.796612 kubelet[2097]: I0710 00:58:29.796444 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/616ea664-5bfe-4d4d-b071-442f25382da7-cni-bin-dir\") pod \"calico-node-5w498\" (UID: \"616ea664-5bfe-4d4d-b071-442f25382da7\") " pod="calico-system/calico-node-5w498" Jul 10 00:58:29.796612 kubelet[2097]: I0710 00:58:29.796454 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/616ea664-5bfe-4d4d-b071-442f25382da7-cni-net-dir\") pod \"calico-node-5w498\" (UID: \"616ea664-5bfe-4d4d-b071-442f25382da7\") " pod="calico-system/calico-node-5w498" Jul 10 00:58:29.796703 kubelet[2097]: I0710 00:58:29.796464 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/616ea664-5bfe-4d4d-b071-442f25382da7-node-certs\") pod \"calico-node-5w498\" (UID: \"616ea664-5bfe-4d4d-b071-442f25382da7\") " pod="calico-system/calico-node-5w498" Jul 10 00:58:29.796703 kubelet[2097]: I0710 00:58:29.796474 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/616ea664-5bfe-4d4d-b071-442f25382da7-lib-modules\") pod \"calico-node-5w498\" (UID: \"616ea664-5bfe-4d4d-b071-442f25382da7\") " pod="calico-system/calico-node-5w498" Jul 10 00:58:29.848195 kubelet[2097]: E0710 00:58:29.848151 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4vdxb" podUID="100cec77-b0fb-436f-a956-a4a5a994a411" Jul 10 00:58:29.898025 kubelet[2097]: I0710 00:58:29.897609 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/100cec77-b0fb-436f-a956-a4a5a994a411-varrun\") pod \"csi-node-driver-4vdxb\" (UID: \"100cec77-b0fb-436f-a956-a4a5a994a411\") " pod="calico-system/csi-node-driver-4vdxb" Jul 10 00:58:29.898025 kubelet[2097]: I0710 00:58:29.897640 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/100cec77-b0fb-436f-a956-a4a5a994a411-kubelet-dir\") pod \"csi-node-driver-4vdxb\" (UID: \"100cec77-b0fb-436f-a956-a4a5a994a411\") " pod="calico-system/csi-node-driver-4vdxb" Jul 10 00:58:29.898025 kubelet[2097]: I0710 00:58:29.897653 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/100cec77-b0fb-436f-a956-a4a5a994a411-registration-dir\") pod \"csi-node-driver-4vdxb\" (UID: \"100cec77-b0fb-436f-a956-a4a5a994a411\") " pod="calico-system/csi-node-driver-4vdxb" Jul 10 00:58:29.898025 kubelet[2097]: I0710 00:58:29.897700 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/100cec77-b0fb-436f-a956-a4a5a994a411-socket-dir\") pod \"csi-node-driver-4vdxb\" (UID: \"100cec77-b0fb-436f-a956-a4a5a994a411\") " pod="calico-system/csi-node-driver-4vdxb" Jul 10 00:58:29.898025 kubelet[2097]: I0710 00:58:29.897711 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6g9lx\" (UniqueName: \"kubernetes.io/projected/100cec77-b0fb-436f-a956-a4a5a994a411-kube-api-access-6g9lx\") pod \"csi-node-driver-4vdxb\" (UID: \"100cec77-b0fb-436f-a956-a4a5a994a411\") " pod="calico-system/csi-node-driver-4vdxb" Jul 10 00:58:29.902893 kubelet[2097]: E0710 00:58:29.902872 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:29.903013 kubelet[2097]: W0710 00:58:29.902999 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:29.903099 kubelet[2097]: E0710 00:58:29.903088 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:29.906024 kubelet[2097]: E0710 00:58:29.906008 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:29.906118 kubelet[2097]: W0710 00:58:29.906108 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:29.906178 kubelet[2097]: E0710 00:58:29.906168 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:29.955000 audit[2530]: NETFILTER_CFG table=filter:95 family=2 entries=20 op=nft_register_rule pid=2530 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:58:29.955000 audit[2530]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffd46df0290 a2=0 a3=7ffd46df027c items=0 ppid=2201 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:29.955000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:58:29.960000 audit[2530]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2530 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:58:29.960000 audit[2530]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd46df0290 a2=0 a3=0 items=0 ppid=2201 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:29.960000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:58:29.998778 kubelet[2097]: E0710 00:58:29.998758 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:29.998973 kubelet[2097]: W0710 00:58:29.998958 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:29.999051 kubelet[2097]: E0710 00:58:29.999038 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:29.999256 kubelet[2097]: E0710 00:58:29.999248 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:29.999316 kubelet[2097]: W0710 00:58:29.999305 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:29.999421 kubelet[2097]: E0710 00:58:29.999409 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:29.999641 kubelet[2097]: E0710 00:58:29.999626 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:29.999641 kubelet[2097]: W0710 00:58:29.999639 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:29.999719 kubelet[2097]: E0710 00:58:29.999652 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:29.999778 kubelet[2097]: E0710 00:58:29.999764 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:29.999830 kubelet[2097]: W0710 00:58:29.999782 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:29.999830 kubelet[2097]: E0710 00:58:29.999792 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:29.999908 kubelet[2097]: E0710 00:58:29.999895 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:29.999954 kubelet[2097]: W0710 00:58:29.999904 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:29.999954 kubelet[2097]: E0710 00:58:29.999923 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:30.001108 env[1248]: time="2025-07-10T00:58:30.001075331Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5w498,Uid:616ea664-5bfe-4d4d-b071-442f25382da7,Namespace:calico-system,Attempt:0,}" Jul 10 00:58:30.006167 kubelet[2097]: E0710 00:58:30.006139 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:30.006167 kubelet[2097]: W0710 00:58:30.006165 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:30.006267 kubelet[2097]: E0710 00:58:30.006180 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:30.006371 kubelet[2097]: E0710 00:58:30.006347 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:30.006371 kubelet[2097]: W0710 00:58:30.006370 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:30.006456 kubelet[2097]: E0710 00:58:30.006382 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:30.006540 kubelet[2097]: E0710 00:58:30.006527 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:30.006540 kubelet[2097]: W0710 00:58:30.006537 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:30.006644 kubelet[2097]: E0710 00:58:30.006630 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:30.006727 kubelet[2097]: E0710 00:58:30.006660 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:30.006793 kubelet[2097]: W0710 00:58:30.006782 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:30.006917 kubelet[2097]: E0710 00:58:30.006906 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:30.007017 kubelet[2097]: E0710 00:58:30.007009 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:30.007079 kubelet[2097]: W0710 00:58:30.007068 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:30.007149 kubelet[2097]: E0710 00:58:30.007138 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:30.007342 kubelet[2097]: E0710 00:58:30.007324 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:30.007407 kubelet[2097]: W0710 00:58:30.007396 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:30.007477 kubelet[2097]: E0710 00:58:30.007466 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:30.007641 kubelet[2097]: E0710 00:58:30.007629 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:30.007641 kubelet[2097]: W0710 00:58:30.007639 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:30.007719 kubelet[2097]: E0710 00:58:30.007650 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:30.007808 kubelet[2097]: E0710 00:58:30.007795 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:30.007808 kubelet[2097]: W0710 00:58:30.007804 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:30.007911 kubelet[2097]: E0710 00:58:30.007900 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:30.008050 kubelet[2097]: E0710 00:58:30.007934 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:30.008116 kubelet[2097]: W0710 00:58:30.008105 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:30.008230 kubelet[2097]: E0710 00:58:30.008220 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:30.008381 kubelet[2097]: E0710 00:58:30.008373 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:30.008447 kubelet[2097]: W0710 00:58:30.008436 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:30.008542 kubelet[2097]: E0710 00:58:30.008525 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:30.008677 kubelet[2097]: E0710 00:58:30.008670 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:30.008739 kubelet[2097]: W0710 00:58:30.008728 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:30.008804 kubelet[2097]: E0710 00:58:30.008792 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:30.009079 kubelet[2097]: E0710 00:58:30.008937 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:30.009079 kubelet[2097]: W0710 00:58:30.008962 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:30.009079 kubelet[2097]: E0710 00:58:30.008975 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:30.009175 kubelet[2097]: E0710 00:58:30.009089 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:30.009175 kubelet[2097]: W0710 00:58:30.009096 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:30.009175 kubelet[2097]: E0710 00:58:30.009104 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:30.009476 kubelet[2097]: E0710 00:58:30.009255 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:30.009476 kubelet[2097]: W0710 00:58:30.009264 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:30.009476 kubelet[2097]: E0710 00:58:30.009282 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:30.009476 kubelet[2097]: E0710 00:58:30.009418 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:30.009476 kubelet[2097]: W0710 00:58:30.009436 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:30.009476 kubelet[2097]: E0710 00:58:30.009444 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:30.009655 kubelet[2097]: E0710 00:58:30.009547 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:30.009655 kubelet[2097]: W0710 00:58:30.009553 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:30.009655 kubelet[2097]: E0710 00:58:30.009559 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:30.009754 kubelet[2097]: E0710 00:58:30.009692 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:30.009754 kubelet[2097]: W0710 00:58:30.009699 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:30.010065 kubelet[2097]: E0710 00:58:30.010043 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:30.011093 kubelet[2097]: E0710 00:58:30.010371 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:30.011093 kubelet[2097]: W0710 00:58:30.010381 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:30.011093 kubelet[2097]: E0710 00:58:30.010390 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:30.011093 kubelet[2097]: E0710 00:58:30.010542 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:30.011093 kubelet[2097]: W0710 00:58:30.010548 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:30.011093 kubelet[2097]: E0710 00:58:30.010556 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:30.014724 kubelet[2097]: E0710 00:58:30.014708 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:30.014817 kubelet[2097]: W0710 00:58:30.014805 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:30.014886 kubelet[2097]: E0710 00:58:30.014875 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:30.028087 kubelet[2097]: E0710 00:58:30.028065 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:30.028087 kubelet[2097]: W0710 00:58:30.028081 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:30.028202 kubelet[2097]: E0710 00:58:30.028095 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:30.097082 env[1248]: time="2025-07-10T00:58:30.096988898Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:58:30.097082 env[1248]: time="2025-07-10T00:58:30.097022113Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:58:30.097212 env[1248]: time="2025-07-10T00:58:30.097029501Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:58:30.098352 env[1248]: time="2025-07-10T00:58:30.097417161Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0c28f2f0415459ab02a2d50224b0083ce4134b96604c6e0a6998aecb6b1ab79b pid=2565 runtime=io.containerd.runc.v2 Jul 10 00:58:30.112122 systemd[1]: Started cri-containerd-0c28f2f0415459ab02a2d50224b0083ce4134b96604c6e0a6998aecb6b1ab79b.scope. Jul 10 00:58:30.135424 kernel: kauditd_printk_skb: 78 callbacks suppressed Jul 10 00:58:30.135525 kernel: audit: type=1400 audit(1752109110.130:938): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.138479 kernel: audit: type=1400 audit(1752109110.130:939): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.141710 kernel: audit: type=1400 audit(1752109110.130:940): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.142574 kernel: audit: type=1400 audit(1752109110.130:941): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.151402 kernel: audit: type=1400 audit(1752109110.130:942): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.151479 kernel: audit: type=1400 audit(1752109110.130:943): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.155024 kernel: audit: type=1400 audit(1752109110.130:944): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.160345 kernel: audit: type=1400 audit(1752109110.130:945): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.167066 kernel: audit: type=1400 audit(1752109110.130:946): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.167118 kernel: audit: type=1400 audit(1752109110.130:947): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.130000 audit: BPF prog-id=122 op=LOAD Jul 10 00:58:30.130000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.130000 audit[2577]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2565 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:30.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063323866326630343135343539616230326132643530323234623030 Jul 10 00:58:30.130000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.130000 audit[2577]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2565 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:30.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063323866326630343135343539616230326132643530323234623030 Jul 10 00:58:30.130000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.130000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.130000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.130000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.130000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.130000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.130000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.130000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.130000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.130000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.130000 audit: BPF prog-id=123 op=LOAD Jul 10 00:58:30.130000 audit[2577]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00032cad0 items=0 ppid=2565 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:30.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063323866326630343135343539616230326132643530323234623030 Jul 10 00:58:30.134000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.134000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.134000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.134000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.134000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.134000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.134000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.134000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.134000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.134000 audit: BPF prog-id=124 op=LOAD Jul 10 00:58:30.134000 audit[2577]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00032cb18 items=0 ppid=2565 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:30.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063323866326630343135343539616230326132643530323234623030 Jul 10 00:58:30.134000 audit: BPF prog-id=124 op=UNLOAD Jul 10 00:58:30.134000 audit: BPF prog-id=123 op=UNLOAD Jul 10 00:58:30.134000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.134000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.134000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.134000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.134000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.134000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.134000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.134000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.134000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.134000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:30.134000 audit: BPF prog-id=125 op=LOAD Jul 10 00:58:30.134000 audit[2577]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00032cf28 items=0 ppid=2565 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:30.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063323866326630343135343539616230326132643530323234623030 Jul 10 00:58:30.171903 env[1248]: time="2025-07-10T00:58:30.169700640Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5w498,Uid:616ea664-5bfe-4d4d-b071-442f25382da7,Namespace:calico-system,Attempt:0,} returns sandbox id \"0c28f2f0415459ab02a2d50224b0083ce4134b96604c6e0a6998aecb6b1ab79b\"" Jul 10 00:58:30.300550 systemd[1]: run-containerd-runc-k8s.io-b17296c3242f4417f207b2608c1d4f96b7147ec79c3788f126f2efd178a8fbe6-runc.Ba4AD2.mount: Deactivated successfully. Jul 10 00:58:31.360476 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1742940442.mount: Deactivated successfully. Jul 10 00:58:31.415638 kubelet[2097]: E0710 00:58:31.415446 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4vdxb" podUID="100cec77-b0fb-436f-a956-a4a5a994a411" Jul 10 00:58:32.397267 env[1248]: time="2025-07-10T00:58:32.397241957Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:32.398368 env[1248]: time="2025-07-10T00:58:32.398353511Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b3baa600c7ff9cd50dc12f2529ef263aaa346dbeca13c77c6553d661fd216b54,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:32.399112 env[1248]: time="2025-07-10T00:58:32.399094352Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:32.399925 env[1248]: time="2025-07-10T00:58:32.399905160Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:da29d745efe5eb7d25f765d3aa439f3fe60710a458efe39c285e58b02bd961af,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:32.400318 env[1248]: time="2025-07-10T00:58:32.400303796Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.2\" returns image reference \"sha256:b3baa600c7ff9cd50dc12f2529ef263aaa346dbeca13c77c6553d661fd216b54\"" Jul 10 00:58:32.401318 env[1248]: time="2025-07-10T00:58:32.401198321Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\"" Jul 10 00:58:32.414256 env[1248]: time="2025-07-10T00:58:32.414233738Z" level=info msg="CreateContainer within sandbox \"b17296c3242f4417f207b2608c1d4f96b7147ec79c3788f126f2efd178a8fbe6\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Jul 10 00:58:32.436977 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1655775405.mount: Deactivated successfully. Jul 10 00:58:32.452722 env[1248]: time="2025-07-10T00:58:32.452696119Z" level=info msg="CreateContainer within sandbox \"b17296c3242f4417f207b2608c1d4f96b7147ec79c3788f126f2efd178a8fbe6\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"2da527f8794451d7218601a4d80a7ad76e06902722ae60314034d4d4215cb2ba\"" Jul 10 00:58:32.453716 env[1248]: time="2025-07-10T00:58:32.453106260Z" level=info msg="StartContainer for \"2da527f8794451d7218601a4d80a7ad76e06902722ae60314034d4d4215cb2ba\"" Jul 10 00:58:32.466351 systemd[1]: Started cri-containerd-2da527f8794451d7218601a4d80a7ad76e06902722ae60314034d4d4215cb2ba.scope. Jul 10 00:58:32.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.475000 audit: BPF prog-id=126 op=LOAD Jul 10 00:58:32.475000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.475000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=2491 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:32.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264613532376638373934343531643732313836303161346438306137 Jul 10 00:58:32.476000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.476000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=2491 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:32.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264613532376638373934343531643732313836303161346438306137 Jul 10 00:58:32.476000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.476000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.476000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.476000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.476000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.476000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.476000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.476000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.476000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.476000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.476000 audit: BPF prog-id=127 op=LOAD Jul 10 00:58:32.476000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c0001e5960 items=0 ppid=2491 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:32.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264613532376638373934343531643732313836303161346438306137 Jul 10 00:58:32.476000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.476000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.476000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.476000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.476000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.476000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.476000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.476000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.476000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.476000 audit: BPF prog-id=128 op=LOAD Jul 10 00:58:32.476000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c0001e59a8 items=0 ppid=2491 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:32.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264613532376638373934343531643732313836303161346438306137 Jul 10 00:58:32.477000 audit: BPF prog-id=128 op=UNLOAD Jul 10 00:58:32.477000 audit: BPF prog-id=127 op=UNLOAD Jul 10 00:58:32.477000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.477000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.477000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.477000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.477000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.477000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.477000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.477000 audit[2609]: AVC avc: denied { perfmon } for pid=2609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.477000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.477000 audit[2609]: AVC avc: denied { bpf } for pid=2609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:32.477000 audit: BPF prog-id=129 op=LOAD Jul 10 00:58:32.477000 audit[2609]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c0001e5db8 items=0 ppid=2491 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:32.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264613532376638373934343531643732313836303161346438306137 Jul 10 00:58:32.516704 env[1248]: time="2025-07-10T00:58:32.516674660Z" level=info msg="StartContainer for \"2da527f8794451d7218601a4d80a7ad76e06902722ae60314034d4d4215cb2ba\" returns successfully" Jul 10 00:58:33.415985 kubelet[2097]: E0710 00:58:33.415691 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4vdxb" podUID="100cec77-b0fb-436f-a956-a4a5a994a411" Jul 10 00:58:33.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.109:22-218.78.46.81:40990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:58:33.484667 systemd[1]: Started sshd@8-139.178.70.109:22-218.78.46.81:40990.service. Jul 10 00:58:33.486896 kubelet[2097]: I0710 00:58:33.486628 2097 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-76889d5858-s2c6p" podStartSLOduration=1.690560093 podStartE2EDuration="4.486608717s" podCreationTimestamp="2025-07-10 00:58:29 +0000 UTC" firstStartedPulling="2025-07-10 00:58:29.604842637 +0000 UTC m=+17.354240291" lastFinishedPulling="2025-07-10 00:58:32.400891261 +0000 UTC m=+20.150288915" observedRunningTime="2025-07-10 00:58:33.486511444 +0000 UTC m=+21.235909115" watchObservedRunningTime="2025-07-10 00:58:33.486608717 +0000 UTC m=+21.236006378" Jul 10 00:58:33.508981 kubelet[2097]: E0710 00:58:33.508951 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.509087 kubelet[2097]: W0710 00:58:33.508988 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.509087 kubelet[2097]: E0710 00:58:33.509009 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.509168 kubelet[2097]: E0710 00:58:33.509153 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.509168 kubelet[2097]: W0710 00:58:33.509165 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.509230 kubelet[2097]: E0710 00:58:33.509173 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.509295 kubelet[2097]: E0710 00:58:33.509280 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.509341 kubelet[2097]: W0710 00:58:33.509297 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.509341 kubelet[2097]: E0710 00:58:33.509305 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.509466 kubelet[2097]: E0710 00:58:33.509452 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.509502 kubelet[2097]: W0710 00:58:33.509469 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.509502 kubelet[2097]: E0710 00:58:33.509478 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.509599 kubelet[2097]: E0710 00:58:33.509586 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.509632 kubelet[2097]: W0710 00:58:33.509596 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.509632 kubelet[2097]: E0710 00:58:33.509614 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.509730 kubelet[2097]: E0710 00:58:33.509717 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.509766 kubelet[2097]: W0710 00:58:33.509727 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.509766 kubelet[2097]: E0710 00:58:33.509743 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.509909 kubelet[2097]: E0710 00:58:33.509866 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.509909 kubelet[2097]: W0710 00:58:33.509872 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.509909 kubelet[2097]: E0710 00:58:33.509888 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.509994 kubelet[2097]: E0710 00:58:33.509989 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.510024 kubelet[2097]: W0710 00:58:33.509995 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.510024 kubelet[2097]: E0710 00:58:33.510001 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.510139 kubelet[2097]: E0710 00:58:33.510119 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.510176 kubelet[2097]: W0710 00:58:33.510142 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.510176 kubelet[2097]: E0710 00:58:33.510154 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.510278 kubelet[2097]: E0710 00:58:33.510261 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.510317 kubelet[2097]: W0710 00:58:33.510279 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.510317 kubelet[2097]: E0710 00:58:33.510289 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.510416 kubelet[2097]: E0710 00:58:33.510402 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.510452 kubelet[2097]: W0710 00:58:33.510412 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.510452 kubelet[2097]: E0710 00:58:33.510427 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.510543 kubelet[2097]: E0710 00:58:33.510530 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.510579 kubelet[2097]: W0710 00:58:33.510541 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.510579 kubelet[2097]: E0710 00:58:33.510556 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.510706 kubelet[2097]: E0710 00:58:33.510690 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.510706 kubelet[2097]: W0710 00:58:33.510703 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.510823 kubelet[2097]: E0710 00:58:33.510713 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.511039 kubelet[2097]: E0710 00:58:33.510848 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.511039 kubelet[2097]: W0710 00:58:33.510872 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.511039 kubelet[2097]: E0710 00:58:33.510881 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.511039 kubelet[2097]: E0710 00:58:33.510983 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.511039 kubelet[2097]: W0710 00:58:33.510989 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.511039 kubelet[2097]: E0710 00:58:33.511003 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.532619 kubelet[2097]: E0710 00:58:33.532595 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.532619 kubelet[2097]: W0710 00:58:33.532614 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.532749 kubelet[2097]: E0710 00:58:33.532630 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.532802 kubelet[2097]: E0710 00:58:33.532783 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.532802 kubelet[2097]: W0710 00:58:33.532796 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.532802 kubelet[2097]: E0710 00:58:33.532802 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.532909 kubelet[2097]: E0710 00:58:33.532892 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.532909 kubelet[2097]: W0710 00:58:33.532897 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.532909 kubelet[2097]: E0710 00:58:33.532905 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.533031 kubelet[2097]: E0710 00:58:33.533009 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.533031 kubelet[2097]: W0710 00:58:33.533018 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.533031 kubelet[2097]: E0710 00:58:33.533027 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.533153 kubelet[2097]: E0710 00:58:33.533144 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.533187 kubelet[2097]: W0710 00:58:33.533151 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.533187 kubelet[2097]: E0710 00:58:33.533168 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.533267 kubelet[2097]: E0710 00:58:33.533256 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.533299 kubelet[2097]: W0710 00:58:33.533270 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.533299 kubelet[2097]: E0710 00:58:33.533276 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.533387 kubelet[2097]: E0710 00:58:33.533377 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.533387 kubelet[2097]: W0710 00:58:33.533384 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.533461 kubelet[2097]: E0710 00:58:33.533393 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.533680 kubelet[2097]: E0710 00:58:33.533600 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.533680 kubelet[2097]: W0710 00:58:33.533612 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.533680 kubelet[2097]: E0710 00:58:33.533628 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.533866 kubelet[2097]: E0710 00:58:33.533806 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.533866 kubelet[2097]: W0710 00:58:33.533815 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.533866 kubelet[2097]: E0710 00:58:33.533827 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.534095 kubelet[2097]: E0710 00:58:33.533999 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.534095 kubelet[2097]: W0710 00:58:33.534008 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.534095 kubelet[2097]: E0710 00:58:33.534020 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.534419 kubelet[2097]: E0710 00:58:33.534229 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.534419 kubelet[2097]: W0710 00:58:33.534238 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.534419 kubelet[2097]: E0710 00:58:33.534257 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.534419 kubelet[2097]: E0710 00:58:33.534367 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.534419 kubelet[2097]: W0710 00:58:33.534374 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.534573 kubelet[2097]: E0710 00:58:33.534428 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.534829 kubelet[2097]: E0710 00:58:33.534628 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.534829 kubelet[2097]: W0710 00:58:33.534635 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.534829 kubelet[2097]: E0710 00:58:33.534650 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.534829 kubelet[2097]: E0710 00:58:33.534755 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.534829 kubelet[2097]: W0710 00:58:33.534760 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.534829 kubelet[2097]: E0710 00:58:33.534770 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.535123 kubelet[2097]: E0710 00:58:33.535059 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.535123 kubelet[2097]: W0710 00:58:33.535068 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.535123 kubelet[2097]: E0710 00:58:33.535074 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.535662 kubelet[2097]: E0710 00:58:33.535271 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.535662 kubelet[2097]: W0710 00:58:33.535280 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.535662 kubelet[2097]: E0710 00:58:33.535288 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.535662 kubelet[2097]: E0710 00:58:33.535453 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.535662 kubelet[2097]: W0710 00:58:33.535458 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.535662 kubelet[2097]: E0710 00:58:33.535466 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:33.535662 kubelet[2097]: E0710 00:58:33.535630 2097 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:58:33.535662 kubelet[2097]: W0710 00:58:33.535637 2097 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:58:33.535662 kubelet[2097]: E0710 00:58:33.535645 2097 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:58:34.044316 env[1248]: time="2025-07-10T00:58:34.044283910Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:34.058645 env[1248]: time="2025-07-10T00:58:34.058622711Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:639615519fa6f7bc4b4756066ba9780068fd291eacc36c120f6c555e62f2b00e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:34.066901 env[1248]: time="2025-07-10T00:58:34.066882680Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:34.073738 env[1248]: time="2025-07-10T00:58:34.073719646Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:972be127eaecd7d1a2d5393b8d14f1ae8f88550bee83e0519e9590c7e15eb41b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:34.074302 env[1248]: time="2025-07-10T00:58:34.074281729Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\" returns image reference \"sha256:639615519fa6f7bc4b4756066ba9780068fd291eacc36c120f6c555e62f2b00e\"" Jul 10 00:58:34.075957 env[1248]: time="2025-07-10T00:58:34.075939098Z" level=info msg="CreateContainer within sandbox \"0c28f2f0415459ab02a2d50224b0083ce4134b96604c6e0a6998aecb6b1ab79b\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 10 00:58:34.094839 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount889333931.mount: Deactivated successfully. Jul 10 00:58:34.099403 env[1248]: time="2025-07-10T00:58:34.099368485Z" level=info msg="CreateContainer within sandbox \"0c28f2f0415459ab02a2d50224b0083ce4134b96604c6e0a6998aecb6b1ab79b\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"8cefc3879ea6f73253732e350c531d85b551bd9f333c1ef2798683a6c5d59e65\"" Jul 10 00:58:34.100215 env[1248]: time="2025-07-10T00:58:34.100167781Z" level=info msg="StartContainer for \"8cefc3879ea6f73253732e350c531d85b551bd9f333c1ef2798683a6c5d59e65\"" Jul 10 00:58:34.123638 systemd[1]: Started cri-containerd-8cefc3879ea6f73253732e350c531d85b551bd9f333c1ef2798683a6c5d59e65.scope. Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=7f28ec589c38 items=0 ppid=2565 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:34.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863656663333837396561366637333235333733326533353063353331 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit: BPF prog-id=130 op=LOAD Jul 10 00:58:34.143000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014f9d8 a2=78 a3=c000286da8 items=0 ppid=2565 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:34.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863656663333837396561366637333235333733326533353063353331 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit: BPF prog-id=131 op=LOAD Jul 10 00:58:34.143000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014f770 a2=78 a3=c000286df8 items=0 ppid=2565 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:34.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863656663333837396561366637333235333733326533353063353331 Jul 10 00:58:34.143000 audit: BPF prog-id=131 op=UNLOAD Jul 10 00:58:34.143000 audit: BPF prog-id=130 op=UNLOAD Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { perfmon } for pid=2683 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit[2683]: AVC avc: denied { bpf } for pid=2683 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:34.143000 audit: BPF prog-id=132 op=LOAD Jul 10 00:58:34.143000 audit[2683]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014fc30 a2=78 a3=c000286e88 items=0 ppid=2565 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:34.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863656663333837396561366637333235333733326533353063353331 Jul 10 00:58:34.154759 env[1248]: time="2025-07-10T00:58:34.154728413Z" level=info msg="StartContainer for \"8cefc3879ea6f73253732e350c531d85b551bd9f333c1ef2798683a6c5d59e65\" returns successfully" Jul 10 00:58:34.164359 systemd[1]: cri-containerd-8cefc3879ea6f73253732e350c531d85b551bd9f333c1ef2798683a6c5d59e65.scope: Deactivated successfully. Jul 10 00:58:34.168000 audit: BPF prog-id=132 op=UNLOAD Jul 10 00:58:34.408015 systemd[1]: run-containerd-runc-k8s.io-8cefc3879ea6f73253732e350c531d85b551bd9f333c1ef2798683a6c5d59e65-runc.n4Xugn.mount: Deactivated successfully. Jul 10 00:58:34.408092 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8cefc3879ea6f73253732e350c531d85b551bd9f333c1ef2798683a6c5d59e65-rootfs.mount: Deactivated successfully. Jul 10 00:58:34.474617 kubelet[2097]: I0710 00:58:34.474572 2097 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 10 00:58:34.503108 env[1248]: time="2025-07-10T00:58:34.503068569Z" level=info msg="shim disconnected" id=8cefc3879ea6f73253732e350c531d85b551bd9f333c1ef2798683a6c5d59e65 Jul 10 00:58:34.503250 env[1248]: time="2025-07-10T00:58:34.503237779Z" level=warning msg="cleaning up after shim disconnected" id=8cefc3879ea6f73253732e350c531d85b551bd9f333c1ef2798683a6c5d59e65 namespace=k8s.io Jul 10 00:58:34.503306 env[1248]: time="2025-07-10T00:58:34.503290265Z" level=info msg="cleaning up dead shim" Jul 10 00:58:34.509778 env[1248]: time="2025-07-10T00:58:34.509750675Z" level=warning msg="cleanup warnings time=\"2025-07-10T00:58:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2724 runtime=io.containerd.runc.v2\n" Jul 10 00:58:35.416128 kubelet[2097]: E0710 00:58:35.416089 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4vdxb" podUID="100cec77-b0fb-436f-a956-a4a5a994a411" Jul 10 00:58:35.477662 env[1248]: time="2025-07-10T00:58:35.477633176Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\"" Jul 10 00:58:37.416070 kubelet[2097]: E0710 00:58:37.416028 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4vdxb" podUID="100cec77-b0fb-436f-a956-a4a5a994a411" Jul 10 00:58:39.416069 kubelet[2097]: E0710 00:58:39.415990 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4vdxb" podUID="100cec77-b0fb-436f-a956-a4a5a994a411" Jul 10 00:58:39.661496 env[1248]: time="2025-07-10T00:58:39.661438399Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:39.662990 env[1248]: time="2025-07-10T00:58:39.662966173Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:77a357d0d33e3016e61153f7d2b7de72371579c4aaeb767fb7ef0af606fe1630,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:39.663895 env[1248]: time="2025-07-10T00:58:39.663875486Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:39.664960 env[1248]: time="2025-07-10T00:58:39.664940404Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:50686775cc60acb78bd92a66fa2d84e1700b2d8e43a718fbadbf35e59baefb4d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:39.665529 env[1248]: time="2025-07-10T00:58:39.665509460Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\" returns image reference \"sha256:77a357d0d33e3016e61153f7d2b7de72371579c4aaeb767fb7ef0af606fe1630\"" Jul 10 00:58:39.670925 env[1248]: time="2025-07-10T00:58:39.670829152Z" level=info msg="CreateContainer within sandbox \"0c28f2f0415459ab02a2d50224b0083ce4134b96604c6e0a6998aecb6b1ab79b\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 10 00:58:39.679162 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3322249792.mount: Deactivated successfully. Jul 10 00:58:39.693551 env[1248]: time="2025-07-10T00:58:39.693515829Z" level=info msg="CreateContainer within sandbox \"0c28f2f0415459ab02a2d50224b0083ce4134b96604c6e0a6998aecb6b1ab79b\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"b91f1fd8a946c24f345b5640a77471d058134458f4acc072e094e60258da80c7\"" Jul 10 00:58:39.697219 env[1248]: time="2025-07-10T00:58:39.697194989Z" level=info msg="StartContainer for \"b91f1fd8a946c24f345b5640a77471d058134458f4acc072e094e60258da80c7\"" Jul 10 00:58:39.717423 systemd[1]: Started cri-containerd-b91f1fd8a946c24f345b5640a77471d058134458f4acc072e094e60258da80c7.scope. Jul 10 00:58:39.756323 kernel: kauditd_printk_skb: 149 callbacks suppressed Jul 10 00:58:39.756423 kernel: audit: type=1400 audit(1752109119.751:982): avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.751000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.751000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1b6967ecc8 items=0 ppid=2565 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:39.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239316631666438613934366332346633343562353634306137373437 Jul 10 00:58:39.764371 kernel: audit: type=1300 audit(1752109119.751:982): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1b6967ecc8 items=0 ppid=2565 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:39.764428 kernel: audit: type=1327 audit(1752109119.751:982): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239316631666438613934366332346633343562353634306137373437 Jul 10 00:58:39.751000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.767380 kernel: audit: type=1400 audit(1752109119.751:983): avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.751000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.770361 kernel: audit: type=1400 audit(1752109119.751:983): avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.770445 kernel: audit: type=1400 audit(1752109119.751:983): avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.751000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.751000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.775545 kernel: audit: type=1400 audit(1752109119.751:983): avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.751000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.782641 kernel: audit: type=1400 audit(1752109119.751:983): avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.782715 kernel: audit: type=1400 audit(1752109119.751:983): avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.782734 kernel: audit: type=1400 audit(1752109119.751:983): avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.751000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.751000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.751000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.751000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.751000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.751000 audit: BPF prog-id=133 op=LOAD Jul 10 00:58:39.751000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00031d228 items=0 ppid=2565 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:39.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239316631666438613934366332346633343562353634306137373437 Jul 10 00:58:39.755000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.755000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.755000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.755000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.755000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.755000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.755000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.755000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.755000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.755000 audit: BPF prog-id=134 op=LOAD Jul 10 00:58:39.755000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00031d278 items=0 ppid=2565 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:39.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239316631666438613934366332346633343562353634306137373437 Jul 10 00:58:39.755000 audit: BPF prog-id=134 op=UNLOAD Jul 10 00:58:39.755000 audit: BPF prog-id=133 op=UNLOAD Jul 10 00:58:39.755000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.755000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.755000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.755000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.755000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.755000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.755000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.755000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.755000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.755000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:39.755000 audit: BPF prog-id=135 op=LOAD Jul 10 00:58:39.755000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00031d308 items=0 ppid=2565 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:39.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239316631666438613934366332346633343562353634306137373437 Jul 10 00:58:39.832028 env[1248]: time="2025-07-10T00:58:39.831939448Z" level=info msg="StartContainer for \"b91f1fd8a946c24f345b5640a77471d058134458f4acc072e094e60258da80c7\" returns successfully" Jul 10 00:58:40.070888 kubelet[2097]: I0710 00:58:40.070774 2097 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 10 00:58:40.529000 audit[2779]: NETFILTER_CFG table=filter:97 family=2 entries=21 op=nft_register_rule pid=2779 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:58:40.529000 audit[2779]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffeac3b4220 a2=0 a3=7ffeac3b420c items=0 ppid=2201 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:40.529000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:58:40.533000 audit[2779]: NETFILTER_CFG table=nat:98 family=2 entries=19 op=nft_register_chain pid=2779 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:58:40.533000 audit[2779]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffeac3b4220 a2=0 a3=7ffeac3b420c items=0 ppid=2201 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:40.533000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:58:40.676725 systemd[1]: run-containerd-runc-k8s.io-b91f1fd8a946c24f345b5640a77471d058134458f4acc072e094e60258da80c7-runc.m3Or6O.mount: Deactivated successfully. Jul 10 00:58:41.416570 kubelet[2097]: E0710 00:58:41.416532 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-4vdxb" podUID="100cec77-b0fb-436f-a956-a4a5a994a411" Jul 10 00:58:42.168454 env[1248]: time="2025-07-10T00:58:42.168232018Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 10 00:58:42.170351 systemd[1]: cri-containerd-b91f1fd8a946c24f345b5640a77471d058134458f4acc072e094e60258da80c7.scope: Deactivated successfully. Jul 10 00:58:42.173000 audit: BPF prog-id=135 op=UNLOAD Jul 10 00:58:42.203577 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b91f1fd8a946c24f345b5640a77471d058134458f4acc072e094e60258da80c7-rootfs.mount: Deactivated successfully. Jul 10 00:58:42.272420 kubelet[2097]: I0710 00:58:42.248612 2097 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Jul 10 00:58:42.273202 env[1248]: time="2025-07-10T00:58:42.273172388Z" level=info msg="shim disconnected" id=b91f1fd8a946c24f345b5640a77471d058134458f4acc072e094e60258da80c7 Jul 10 00:58:42.273294 env[1248]: time="2025-07-10T00:58:42.273278190Z" level=warning msg="cleaning up after shim disconnected" id=b91f1fd8a946c24f345b5640a77471d058134458f4acc072e094e60258da80c7 namespace=k8s.io Jul 10 00:58:42.273374 env[1248]: time="2025-07-10T00:58:42.273360362Z" level=info msg="cleaning up dead shim" Jul 10 00:58:42.279689 env[1248]: time="2025-07-10T00:58:42.279664300Z" level=warning msg="cleanup warnings time=\"2025-07-10T00:58:42Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2795 runtime=io.containerd.runc.v2\n" Jul 10 00:58:42.595517 env[1248]: time="2025-07-10T00:58:42.595444449Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\"" Jul 10 00:58:42.754799 systemd[1]: Created slice kubepods-burstable-pod1d40f785_0a7b_4a11_9275_67e6b3486e34.slice. Jul 10 00:58:42.761045 systemd[1]: Created slice kubepods-besteffort-pode40791bb_1dd3_4f13_a751_d75795ef4c90.slice. Jul 10 00:58:42.765660 systemd[1]: Created slice kubepods-besteffort-pod929acd7b_6935_4495_be2b_b8264653f84a.slice. Jul 10 00:58:42.770519 systemd[1]: Created slice kubepods-besteffort-poddfc77fd4_c756_489e_a5e3_3692e4542650.slice. Jul 10 00:58:42.776385 systemd[1]: Created slice kubepods-burstable-pod1b07da51_61a4_4653_83cd_4b8b69b6c8c0.slice. Jul 10 00:58:42.782265 systemd[1]: Created slice kubepods-besteffort-pod79c54820_9de2_4eff_9b0c_ba6143dd7d8d.slice. Jul 10 00:58:42.787079 systemd[1]: Created slice kubepods-besteffort-poda74bc768_f84b_420f_a711_e0e4f55c6504.slice. Jul 10 00:58:42.789930 systemd[1]: Created slice kubepods-besteffort-pod2344db36_50ac_4694_a93c_64e61cbf023f.slice. Jul 10 00:58:42.798956 kubelet[2097]: I0710 00:58:42.798581 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/2344db36-50ac-4694-a93c-64e61cbf023f-calico-apiserver-certs\") pod \"calico-apiserver-8555b5848b-wn4zc\" (UID: \"2344db36-50ac-4694-a93c-64e61cbf023f\") " pod="calico-apiserver/calico-apiserver-8555b5848b-wn4zc" Jul 10 00:58:42.798956 kubelet[2097]: I0710 00:58:42.798608 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7fpj8\" (UniqueName: \"kubernetes.io/projected/79c54820-9de2-4eff-9b0c-ba6143dd7d8d-kube-api-access-7fpj8\") pod \"calico-kube-controllers-65594c9c4c-wld2r\" (UID: \"79c54820-9de2-4eff-9b0c-ba6143dd7d8d\") " pod="calico-system/calico-kube-controllers-65594c9c4c-wld2r" Jul 10 00:58:42.798956 kubelet[2097]: I0710 00:58:42.798622 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/a74bc768-f84b-420f-a711-e0e4f55c6504-whisker-backend-key-pair\") pod \"whisker-7ccc65fc49-j64q2\" (UID: \"a74bc768-f84b-420f-a711-e0e4f55c6504\") " pod="calico-system/whisker-7ccc65fc49-j64q2" Jul 10 00:58:42.798956 kubelet[2097]: I0710 00:58:42.798634 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/1d40f785-0a7b-4a11-9275-67e6b3486e34-config-volume\") pod \"coredns-668d6bf9bc-b47q7\" (UID: \"1d40f785-0a7b-4a11-9275-67e6b3486e34\") " pod="kube-system/coredns-668d6bf9bc-b47q7" Jul 10 00:58:42.798956 kubelet[2097]: I0710 00:58:42.798644 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/dfc77fd4-c756-489e-a5e3-3692e4542650-config\") pod \"goldmane-768f4c5c69-6bh96\" (UID: \"dfc77fd4-c756-489e-a5e3-3692e4542650\") " pod="calico-system/goldmane-768f4c5c69-6bh96" Jul 10 00:58:42.799347 kubelet[2097]: I0710 00:58:42.798655 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9cbbk\" (UniqueName: \"kubernetes.io/projected/a74bc768-f84b-420f-a711-e0e4f55c6504-kube-api-access-9cbbk\") pod \"whisker-7ccc65fc49-j64q2\" (UID: \"a74bc768-f84b-420f-a711-e0e4f55c6504\") " pod="calico-system/whisker-7ccc65fc49-j64q2" Jul 10 00:58:42.799347 kubelet[2097]: I0710 00:58:42.798665 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tvlml\" (UniqueName: \"kubernetes.io/projected/1b07da51-61a4-4653-83cd-4b8b69b6c8c0-kube-api-access-tvlml\") pod \"coredns-668d6bf9bc-d6d57\" (UID: \"1b07da51-61a4-4653-83cd-4b8b69b6c8c0\") " pod="kube-system/coredns-668d6bf9bc-d6d57" Jul 10 00:58:42.799347 kubelet[2097]: I0710 00:58:42.798675 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/929acd7b-6935-4495-be2b-b8264653f84a-calico-apiserver-certs\") pod \"calico-apiserver-6765fdc8c8-5kgrr\" (UID: \"929acd7b-6935-4495-be2b-b8264653f84a\") " pod="calico-apiserver/calico-apiserver-6765fdc8c8-5kgrr" Jul 10 00:58:42.799347 kubelet[2097]: I0710 00:58:42.798688 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c2r4f\" (UniqueName: \"kubernetes.io/projected/e40791bb-1dd3-4f13-a751-d75795ef4c90-kube-api-access-c2r4f\") pod \"calico-apiserver-6765fdc8c8-2wnxd\" (UID: \"e40791bb-1dd3-4f13-a751-d75795ef4c90\") " pod="calico-apiserver/calico-apiserver-6765fdc8c8-2wnxd" Jul 10 00:58:42.799347 kubelet[2097]: I0710 00:58:42.798698 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/dfc77fd4-c756-489e-a5e3-3692e4542650-goldmane-key-pair\") pod \"goldmane-768f4c5c69-6bh96\" (UID: \"dfc77fd4-c756-489e-a5e3-3692e4542650\") " pod="calico-system/goldmane-768f4c5c69-6bh96" Jul 10 00:58:42.800520 kubelet[2097]: I0710 00:58:42.798710 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4rl2j\" (UniqueName: \"kubernetes.io/projected/2344db36-50ac-4694-a93c-64e61cbf023f-kube-api-access-4rl2j\") pod \"calico-apiserver-8555b5848b-wn4zc\" (UID: \"2344db36-50ac-4694-a93c-64e61cbf023f\") " pod="calico-apiserver/calico-apiserver-8555b5848b-wn4zc" Jul 10 00:58:42.800520 kubelet[2097]: I0710 00:58:42.798720 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e40791bb-1dd3-4f13-a751-d75795ef4c90-calico-apiserver-certs\") pod \"calico-apiserver-6765fdc8c8-2wnxd\" (UID: \"e40791bb-1dd3-4f13-a751-d75795ef4c90\") " pod="calico-apiserver/calico-apiserver-6765fdc8c8-2wnxd" Jul 10 00:58:42.800520 kubelet[2097]: I0710 00:58:42.798730 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vtgtx\" (UniqueName: \"kubernetes.io/projected/dfc77fd4-c756-489e-a5e3-3692e4542650-kube-api-access-vtgtx\") pod \"goldmane-768f4c5c69-6bh96\" (UID: \"dfc77fd4-c756-489e-a5e3-3692e4542650\") " pod="calico-system/goldmane-768f4c5c69-6bh96" Jul 10 00:58:42.800520 kubelet[2097]: I0710 00:58:42.798746 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lx95x\" (UniqueName: \"kubernetes.io/projected/1d40f785-0a7b-4a11-9275-67e6b3486e34-kube-api-access-lx95x\") pod \"coredns-668d6bf9bc-b47q7\" (UID: \"1d40f785-0a7b-4a11-9275-67e6b3486e34\") " pod="kube-system/coredns-668d6bf9bc-b47q7" Jul 10 00:58:42.800520 kubelet[2097]: I0710 00:58:42.798760 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dfc77fd4-c756-489e-a5e3-3692e4542650-goldmane-ca-bundle\") pod \"goldmane-768f4c5c69-6bh96\" (UID: \"dfc77fd4-c756-489e-a5e3-3692e4542650\") " pod="calico-system/goldmane-768f4c5c69-6bh96" Jul 10 00:58:42.800664 kubelet[2097]: I0710 00:58:42.798773 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/79c54820-9de2-4eff-9b0c-ba6143dd7d8d-tigera-ca-bundle\") pod \"calico-kube-controllers-65594c9c4c-wld2r\" (UID: \"79c54820-9de2-4eff-9b0c-ba6143dd7d8d\") " pod="calico-system/calico-kube-controllers-65594c9c4c-wld2r" Jul 10 00:58:42.800664 kubelet[2097]: I0710 00:58:42.798789 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/1b07da51-61a4-4653-83cd-4b8b69b6c8c0-config-volume\") pod \"coredns-668d6bf9bc-d6d57\" (UID: \"1b07da51-61a4-4653-83cd-4b8b69b6c8c0\") " pod="kube-system/coredns-668d6bf9bc-d6d57" Jul 10 00:58:42.800664 kubelet[2097]: I0710 00:58:42.798803 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a74bc768-f84b-420f-a711-e0e4f55c6504-whisker-ca-bundle\") pod \"whisker-7ccc65fc49-j64q2\" (UID: \"a74bc768-f84b-420f-a711-e0e4f55c6504\") " pod="calico-system/whisker-7ccc65fc49-j64q2" Jul 10 00:58:42.800664 kubelet[2097]: I0710 00:58:42.798813 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j5hsk\" (UniqueName: \"kubernetes.io/projected/929acd7b-6935-4495-be2b-b8264653f84a-kube-api-access-j5hsk\") pod \"calico-apiserver-6765fdc8c8-5kgrr\" (UID: \"929acd7b-6935-4495-be2b-b8264653f84a\") " pod="calico-apiserver/calico-apiserver-6765fdc8c8-5kgrr" Jul 10 00:58:43.069910 env[1248]: time="2025-07-10T00:58:43.069878839Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-b47q7,Uid:1d40f785-0a7b-4a11-9275-67e6b3486e34,Namespace:kube-system,Attempt:0,}" Jul 10 00:58:43.070348 env[1248]: time="2025-07-10T00:58:43.070218247Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6765fdc8c8-5kgrr,Uid:929acd7b-6935-4495-be2b-b8264653f84a,Namespace:calico-apiserver,Attempt:0,}" Jul 10 00:58:43.070586 env[1248]: time="2025-07-10T00:58:43.070479770Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6765fdc8c8-2wnxd,Uid:e40791bb-1dd3-4f13-a751-d75795ef4c90,Namespace:calico-apiserver,Attempt:0,}" Jul 10 00:58:43.074192 env[1248]: time="2025-07-10T00:58:43.074079289Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-768f4c5c69-6bh96,Uid:dfc77fd4-c756-489e-a5e3-3692e4542650,Namespace:calico-system,Attempt:0,}" Jul 10 00:58:43.080050 env[1248]: time="2025-07-10T00:58:43.080007654Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-d6d57,Uid:1b07da51-61a4-4653-83cd-4b8b69b6c8c0,Namespace:kube-system,Attempt:0,}" Jul 10 00:58:43.085849 env[1248]: time="2025-07-10T00:58:43.085699109Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65594c9c4c-wld2r,Uid:79c54820-9de2-4eff-9b0c-ba6143dd7d8d,Namespace:calico-system,Attempt:0,}" Jul 10 00:58:43.089507 env[1248]: time="2025-07-10T00:58:43.089366778Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7ccc65fc49-j64q2,Uid:a74bc768-f84b-420f-a711-e0e4f55c6504,Namespace:calico-system,Attempt:0,}" Jul 10 00:58:43.099073 env[1248]: time="2025-07-10T00:58:43.098836564Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8555b5848b-wn4zc,Uid:2344db36-50ac-4694-a93c-64e61cbf023f,Namespace:calico-apiserver,Attempt:0,}" Jul 10 00:58:43.418922 systemd[1]: Created slice kubepods-besteffort-pod100cec77_b0fb_436f_a956_a4a5a994a411.slice. Jul 10 00:58:43.427397 env[1248]: time="2025-07-10T00:58:43.420524291Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-4vdxb,Uid:100cec77-b0fb-436f-a956-a4a5a994a411,Namespace:calico-system,Attempt:0,}" Jul 10 00:58:44.153526 env[1248]: time="2025-07-10T00:58:44.153483743Z" level=error msg="Failed to destroy network for sandbox \"74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.158117 env[1248]: time="2025-07-10T00:58:44.153891521Z" level=error msg="encountered an error cleaning up failed sandbox \"74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.158117 env[1248]: time="2025-07-10T00:58:44.153928812Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-768f4c5c69-6bh96,Uid:dfc77fd4-c756-489e-a5e3-3692e4542650,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.158117 env[1248]: time="2025-07-10T00:58:44.155413398Z" level=error msg="Failed to destroy network for sandbox \"1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.158117 env[1248]: time="2025-07-10T00:58:44.155626154Z" level=error msg="encountered an error cleaning up failed sandbox \"1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.158117 env[1248]: time="2025-07-10T00:58:44.155665562Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6765fdc8c8-2wnxd,Uid:e40791bb-1dd3-4f13-a751-d75795ef4c90,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.165632 kubelet[2097]: E0710 00:58:44.165589 2097 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.178249 kubelet[2097]: E0710 00:58:44.178204 2097 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-768f4c5c69-6bh96" Jul 10 00:58:44.178249 kubelet[2097]: E0710 00:58:44.178249 2097 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-768f4c5c69-6bh96" Jul 10 00:58:44.178433 kubelet[2097]: E0710 00:58:44.178285 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-768f4c5c69-6bh96_calico-system(dfc77fd4-c756-489e-a5e3-3692e4542650)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-768f4c5c69-6bh96_calico-system(dfc77fd4-c756-489e-a5e3-3692e4542650)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-768f4c5c69-6bh96" podUID="dfc77fd4-c756-489e-a5e3-3692e4542650" Jul 10 00:58:44.179876 env[1248]: time="2025-07-10T00:58:44.179844958Z" level=error msg="Failed to destroy network for sandbox \"b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.180114 env[1248]: time="2025-07-10T00:58:44.180088669Z" level=error msg="encountered an error cleaning up failed sandbox \"b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.180164 env[1248]: time="2025-07-10T00:58:44.180129596Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-d6d57,Uid:1b07da51-61a4-4653-83cd-4b8b69b6c8c0,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.180254 kubelet[2097]: E0710 00:58:44.180237 2097 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.180294 kubelet[2097]: E0710 00:58:44.180264 2097 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-d6d57" Jul 10 00:58:44.180294 kubelet[2097]: E0710 00:58:44.180274 2097 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-d6d57" Jul 10 00:58:44.180366 kubelet[2097]: E0710 00:58:44.180294 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-d6d57_kube-system(1b07da51-61a4-4653-83cd-4b8b69b6c8c0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-d6d57_kube-system(1b07da51-61a4-4653-83cd-4b8b69b6c8c0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-d6d57" podUID="1b07da51-61a4-4653-83cd-4b8b69b6c8c0" Jul 10 00:58:44.184160 kubelet[2097]: E0710 00:58:44.184089 2097 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.184160 kubelet[2097]: E0710 00:58:44.184122 2097 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6765fdc8c8-2wnxd" Jul 10 00:58:44.184160 kubelet[2097]: E0710 00:58:44.184135 2097 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6765fdc8c8-2wnxd" Jul 10 00:58:44.184277 kubelet[2097]: E0710 00:58:44.184167 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6765fdc8c8-2wnxd_calico-apiserver(e40791bb-1dd3-4f13-a751-d75795ef4c90)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6765fdc8c8-2wnxd_calico-apiserver(e40791bb-1dd3-4f13-a751-d75795ef4c90)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6765fdc8c8-2wnxd" podUID="e40791bb-1dd3-4f13-a751-d75795ef4c90" Jul 10 00:58:44.190845 env[1248]: time="2025-07-10T00:58:44.190802359Z" level=error msg="Failed to destroy network for sandbox \"0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.191096 env[1248]: time="2025-07-10T00:58:44.191073360Z" level=error msg="encountered an error cleaning up failed sandbox \"0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.191143 env[1248]: time="2025-07-10T00:58:44.191118427Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65594c9c4c-wld2r,Uid:79c54820-9de2-4eff-9b0c-ba6143dd7d8d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.191429 kubelet[2097]: E0710 00:58:44.191267 2097 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.191429 kubelet[2097]: E0710 00:58:44.191315 2097 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-65594c9c4c-wld2r" Jul 10 00:58:44.191429 kubelet[2097]: E0710 00:58:44.191349 2097 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-65594c9c4c-wld2r" Jul 10 00:58:44.206599 kubelet[2097]: E0710 00:58:44.191394 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-65594c9c4c-wld2r_calico-system(79c54820-9de2-4eff-9b0c-ba6143dd7d8d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-65594c9c4c-wld2r_calico-system(79c54820-9de2-4eff-9b0c-ba6143dd7d8d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-65594c9c4c-wld2r" podUID="79c54820-9de2-4eff-9b0c-ba6143dd7d8d" Jul 10 00:58:44.206599 kubelet[2097]: E0710 00:58:44.193044 2097 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.206599 kubelet[2097]: E0710 00:58:44.193066 2097 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-4vdxb" Jul 10 00:58:44.203750 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e-shm.mount: Deactivated successfully. Jul 10 00:58:44.212247 env[1248]: time="2025-07-10T00:58:44.192601447Z" level=error msg="Failed to destroy network for sandbox \"ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.212247 env[1248]: time="2025-07-10T00:58:44.192881117Z" level=error msg="encountered an error cleaning up failed sandbox \"ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.212247 env[1248]: time="2025-07-10T00:58:44.192923552Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-4vdxb,Uid:100cec77-b0fb-436f-a956-a4a5a994a411,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.212247 env[1248]: time="2025-07-10T00:58:44.206744057Z" level=error msg="Failed to destroy network for sandbox \"1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.212247 env[1248]: time="2025-07-10T00:58:44.208634146Z" level=error msg="encountered an error cleaning up failed sandbox \"1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.212247 env[1248]: time="2025-07-10T00:58:44.208666029Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6765fdc8c8-5kgrr,Uid:929acd7b-6935-4495-be2b-b8264653f84a,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.212440 kubelet[2097]: E0710 00:58:44.193084 2097 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-4vdxb" Jul 10 00:58:44.212440 kubelet[2097]: E0710 00:58:44.193113 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-4vdxb_calico-system(100cec77-b0fb-436f-a956-a4a5a994a411)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-4vdxb_calico-system(100cec77-b0fb-436f-a956-a4a5a994a411)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-4vdxb" podUID="100cec77-b0fb-436f-a956-a4a5a994a411" Jul 10 00:58:44.212440 kubelet[2097]: E0710 00:58:44.208780 2097 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.203804 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da-shm.mount: Deactivated successfully. Jul 10 00:58:44.212560 kubelet[2097]: E0710 00:58:44.208820 2097 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6765fdc8c8-5kgrr" Jul 10 00:58:44.212560 kubelet[2097]: E0710 00:58:44.208838 2097 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6765fdc8c8-5kgrr" Jul 10 00:58:44.212560 kubelet[2097]: E0710 00:58:44.208867 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6765fdc8c8-5kgrr_calico-apiserver(929acd7b-6935-4495-be2b-b8264653f84a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6765fdc8c8-5kgrr_calico-apiserver(929acd7b-6935-4495-be2b-b8264653f84a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6765fdc8c8-5kgrr" podUID="929acd7b-6935-4495-be2b-b8264653f84a" Jul 10 00:58:44.203841 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b-shm.mount: Deactivated successfully. Jul 10 00:58:44.203874 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2-shm.mount: Deactivated successfully. Jul 10 00:58:44.203912 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051-shm.mount: Deactivated successfully. Jul 10 00:58:44.207985 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901-shm.mount: Deactivated successfully. Jul 10 00:58:44.221022 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b-shm.mount: Deactivated successfully. Jul 10 00:58:44.222788 kubelet[2097]: E0710 00:58:44.221852 2097 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.222788 kubelet[2097]: E0710 00:58:44.221891 2097 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-b47q7" Jul 10 00:58:44.222788 kubelet[2097]: E0710 00:58:44.221906 2097 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-b47q7" Jul 10 00:58:44.222876 env[1248]: time="2025-07-10T00:58:44.219622177Z" level=error msg="Failed to destroy network for sandbox \"76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.222876 env[1248]: time="2025-07-10T00:58:44.221705436Z" level=error msg="encountered an error cleaning up failed sandbox \"76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.222876 env[1248]: time="2025-07-10T00:58:44.221741039Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-b47q7,Uid:1d40f785-0a7b-4a11-9275-67e6b3486e34,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.222945 kubelet[2097]: E0710 00:58:44.221942 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-b47q7_kube-system(1d40f785-0a7b-4a11-9275-67e6b3486e34)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-b47q7_kube-system(1d40f785-0a7b-4a11-9275-67e6b3486e34)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-b47q7" podUID="1d40f785-0a7b-4a11-9275-67e6b3486e34" Jul 10 00:58:44.230311 env[1248]: time="2025-07-10T00:58:44.230280999Z" level=error msg="Failed to destroy network for sandbox \"7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.232018 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc-shm.mount: Deactivated successfully. Jul 10 00:58:44.232960 env[1248]: time="2025-07-10T00:58:44.232939434Z" level=error msg="encountered an error cleaning up failed sandbox \"7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.233083 env[1248]: time="2025-07-10T00:58:44.233066114Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7ccc65fc49-j64q2,Uid:a74bc768-f84b-420f-a711-e0e4f55c6504,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.233503 kubelet[2097]: E0710 00:58:44.233363 2097 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.233503 kubelet[2097]: E0710 00:58:44.233410 2097 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-7ccc65fc49-j64q2" Jul 10 00:58:44.233503 kubelet[2097]: E0710 00:58:44.233437 2097 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-7ccc65fc49-j64q2" Jul 10 00:58:44.233618 kubelet[2097]: E0710 00:58:44.233469 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-7ccc65fc49-j64q2_calico-system(a74bc768-f84b-420f-a711-e0e4f55c6504)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-7ccc65fc49-j64q2_calico-system(a74bc768-f84b-420f-a711-e0e4f55c6504)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-7ccc65fc49-j64q2" podUID="a74bc768-f84b-420f-a711-e0e4f55c6504" Jul 10 00:58:44.235302 env[1248]: time="2025-07-10T00:58:44.235197065Z" level=error msg="Failed to destroy network for sandbox \"dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.237070 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178-shm.mount: Deactivated successfully. Jul 10 00:58:44.238431 env[1248]: time="2025-07-10T00:58:44.238408325Z" level=error msg="encountered an error cleaning up failed sandbox \"dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.238524 env[1248]: time="2025-07-10T00:58:44.238505459Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8555b5848b-wn4zc,Uid:2344db36-50ac-4694-a93c-64e61cbf023f,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.238713 kubelet[2097]: E0710 00:58:44.238692 2097 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.238774 kubelet[2097]: E0710 00:58:44.238725 2097 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-8555b5848b-wn4zc" Jul 10 00:58:44.238774 kubelet[2097]: E0710 00:58:44.238744 2097 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-8555b5848b-wn4zc" Jul 10 00:58:44.238774 kubelet[2097]: E0710 00:58:44.238767 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-8555b5848b-wn4zc_calico-apiserver(2344db36-50ac-4694-a93c-64e61cbf023f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-8555b5848b-wn4zc_calico-apiserver(2344db36-50ac-4694-a93c-64e61cbf023f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-8555b5848b-wn4zc" podUID="2344db36-50ac-4694-a93c-64e61cbf023f" Jul 10 00:58:44.496876 kubelet[2097]: I0710 00:58:44.494718 2097 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" Jul 10 00:58:44.497922 kubelet[2097]: I0710 00:58:44.497903 2097 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" Jul 10 00:58:44.540326 env[1248]: time="2025-07-10T00:58:44.540303528Z" level=info msg="StopPodSandbox for \"1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901\"" Jul 10 00:58:44.540896 env[1248]: time="2025-07-10T00:58:44.540881133Z" level=info msg="StopPodSandbox for \"7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc\"" Jul 10 00:58:44.542626 kubelet[2097]: I0710 00:58:44.541495 2097 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" Jul 10 00:58:44.542704 env[1248]: time="2025-07-10T00:58:44.542466735Z" level=info msg="StopPodSandbox for \"dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178\"" Jul 10 00:58:44.544585 kubelet[2097]: I0710 00:58:44.544167 2097 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" Jul 10 00:58:44.545902 env[1248]: time="2025-07-10T00:58:44.545872030Z" level=info msg="StopPodSandbox for \"76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b\"" Jul 10 00:58:44.547731 kubelet[2097]: I0710 00:58:44.547465 2097 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" Jul 10 00:58:44.550393 env[1248]: time="2025-07-10T00:58:44.550361605Z" level=info msg="StopPodSandbox for \"0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b\"" Jul 10 00:58:44.554868 kubelet[2097]: I0710 00:58:44.554471 2097 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" Jul 10 00:58:44.555095 env[1248]: time="2025-07-10T00:58:44.555075534Z" level=info msg="StopPodSandbox for \"1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2\"" Jul 10 00:58:44.557287 kubelet[2097]: I0710 00:58:44.556929 2097 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" Jul 10 00:58:44.557501 env[1248]: time="2025-07-10T00:58:44.557482957Z" level=info msg="StopPodSandbox for \"74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051\"" Jul 10 00:58:44.559022 kubelet[2097]: I0710 00:58:44.558391 2097 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" Jul 10 00:58:44.560147 env[1248]: time="2025-07-10T00:58:44.560108172Z" level=info msg="StopPodSandbox for \"b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da\"" Jul 10 00:58:44.570511 kubelet[2097]: I0710 00:58:44.570080 2097 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" Jul 10 00:58:44.571392 env[1248]: time="2025-07-10T00:58:44.570893174Z" level=info msg="StopPodSandbox for \"ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e\"" Jul 10 00:58:44.602277 env[1248]: time="2025-07-10T00:58:44.602240754Z" level=error msg="StopPodSandbox for \"7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc\" failed" error="failed to destroy network for sandbox \"7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.608402 env[1248]: time="2025-07-10T00:58:44.602505737Z" level=error msg="StopPodSandbox for \"1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901\" failed" error="failed to destroy network for sandbox \"1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.608882 kubelet[2097]: E0710 00:58:44.608839 2097 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" Jul 10 00:58:44.608882 kubelet[2097]: E0710 00:58:44.608839 2097 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" Jul 10 00:58:44.626783 kubelet[2097]: E0710 00:58:44.609000 2097 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901"} Jul 10 00:58:44.626783 kubelet[2097]: E0710 00:58:44.626711 2097 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"929acd7b-6935-4495-be2b-b8264653f84a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 10 00:58:44.626783 kubelet[2097]: E0710 00:58:44.626727 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"929acd7b-6935-4495-be2b-b8264653f84a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6765fdc8c8-5kgrr" podUID="929acd7b-6935-4495-be2b-b8264653f84a" Jul 10 00:58:44.626783 kubelet[2097]: E0710 00:58:44.608892 2097 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc"} Jul 10 00:58:44.626986 kubelet[2097]: E0710 00:58:44.626753 2097 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a74bc768-f84b-420f-a711-e0e4f55c6504\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 10 00:58:44.626986 kubelet[2097]: E0710 00:58:44.626765 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a74bc768-f84b-420f-a711-e0e4f55c6504\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-7ccc65fc49-j64q2" podUID="a74bc768-f84b-420f-a711-e0e4f55c6504" Jul 10 00:58:44.638305 env[1248]: time="2025-07-10T00:58:44.638254227Z" level=error msg="StopPodSandbox for \"dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178\" failed" error="failed to destroy network for sandbox \"dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.638459 kubelet[2097]: E0710 00:58:44.638417 2097 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" Jul 10 00:58:44.638459 kubelet[2097]: E0710 00:58:44.638454 2097 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178"} Jul 10 00:58:44.638532 kubelet[2097]: E0710 00:58:44.638476 2097 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2344db36-50ac-4694-a93c-64e61cbf023f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 10 00:58:44.638532 kubelet[2097]: E0710 00:58:44.638496 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2344db36-50ac-4694-a93c-64e61cbf023f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-8555b5848b-wn4zc" podUID="2344db36-50ac-4694-a93c-64e61cbf023f" Jul 10 00:58:44.642352 env[1248]: time="2025-07-10T00:58:44.642306662Z" level=error msg="StopPodSandbox for \"76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b\" failed" error="failed to destroy network for sandbox \"76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.642590 kubelet[2097]: E0710 00:58:44.642509 2097 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" Jul 10 00:58:44.642590 kubelet[2097]: E0710 00:58:44.642534 2097 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b"} Jul 10 00:58:44.642590 kubelet[2097]: E0710 00:58:44.642562 2097 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1d40f785-0a7b-4a11-9275-67e6b3486e34\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 10 00:58:44.642590 kubelet[2097]: E0710 00:58:44.642575 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1d40f785-0a7b-4a11-9275-67e6b3486e34\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-b47q7" podUID="1d40f785-0a7b-4a11-9275-67e6b3486e34" Jul 10 00:58:44.665877 env[1248]: time="2025-07-10T00:58:44.665843540Z" level=error msg="StopPodSandbox for \"0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b\" failed" error="failed to destroy network for sandbox \"0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.666251 kubelet[2097]: E0710 00:58:44.666119 2097 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" Jul 10 00:58:44.666251 kubelet[2097]: E0710 00:58:44.666187 2097 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b"} Jul 10 00:58:44.666251 kubelet[2097]: E0710 00:58:44.666208 2097 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"79c54820-9de2-4eff-9b0c-ba6143dd7d8d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 10 00:58:44.666251 kubelet[2097]: E0710 00:58:44.666222 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"79c54820-9de2-4eff-9b0c-ba6143dd7d8d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-65594c9c4c-wld2r" podUID="79c54820-9de2-4eff-9b0c-ba6143dd7d8d" Jul 10 00:58:44.677765 env[1248]: time="2025-07-10T00:58:44.677726863Z" level=error msg="StopPodSandbox for \"b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da\" failed" error="failed to destroy network for sandbox \"b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.677903 kubelet[2097]: E0710 00:58:44.677877 2097 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" Jul 10 00:58:44.677957 kubelet[2097]: E0710 00:58:44.677913 2097 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da"} Jul 10 00:58:44.677957 kubelet[2097]: E0710 00:58:44.677933 2097 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1b07da51-61a4-4653-83cd-4b8b69b6c8c0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 10 00:58:44.677957 kubelet[2097]: E0710 00:58:44.677946 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1b07da51-61a4-4653-83cd-4b8b69b6c8c0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-d6d57" podUID="1b07da51-61a4-4653-83cd-4b8b69b6c8c0" Jul 10 00:58:44.685476 kubelet[2097]: E0710 00:58:44.678564 2097 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" Jul 10 00:58:44.685476 kubelet[2097]: E0710 00:58:44.678582 2097 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2"} Jul 10 00:58:44.685476 kubelet[2097]: E0710 00:58:44.678599 2097 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e40791bb-1dd3-4f13-a751-d75795ef4c90\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 10 00:58:44.685476 kubelet[2097]: E0710 00:58:44.678625 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e40791bb-1dd3-4f13-a751-d75795ef4c90\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6765fdc8c8-2wnxd" podUID="e40791bb-1dd3-4f13-a751-d75795ef4c90" Jul 10 00:58:44.685638 env[1248]: time="2025-07-10T00:58:44.678480212Z" level=error msg="StopPodSandbox for \"1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2\" failed" error="failed to destroy network for sandbox \"1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.688873 env[1248]: time="2025-07-10T00:58:44.688844742Z" level=error msg="StopPodSandbox for \"74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051\" failed" error="failed to destroy network for sandbox \"74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.689060 kubelet[2097]: E0710 00:58:44.689030 2097 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" Jul 10 00:58:44.689096 kubelet[2097]: E0710 00:58:44.689063 2097 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051"} Jul 10 00:58:44.689096 kubelet[2097]: E0710 00:58:44.689082 2097 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"dfc77fd4-c756-489e-a5e3-3692e4542650\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 10 00:58:44.689155 kubelet[2097]: E0710 00:58:44.689095 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"dfc77fd4-c756-489e-a5e3-3692e4542650\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-768f4c5c69-6bh96" podUID="dfc77fd4-c756-489e-a5e3-3692e4542650" Jul 10 00:58:44.691935 env[1248]: time="2025-07-10T00:58:44.691910129Z" level=error msg="StopPodSandbox for \"ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e\" failed" error="failed to destroy network for sandbox \"ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:58:44.692107 kubelet[2097]: E0710 00:58:44.692031 2097 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" Jul 10 00:58:44.692107 kubelet[2097]: E0710 00:58:44.692050 2097 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e"} Jul 10 00:58:44.692107 kubelet[2097]: E0710 00:58:44.692079 2097 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"100cec77-b0fb-436f-a956-a4a5a994a411\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 10 00:58:44.692107 kubelet[2097]: E0710 00:58:44.692093 2097 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"100cec77-b0fb-436f-a956-a4a5a994a411\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-4vdxb" podUID="100cec77-b0fb-436f-a956-a4a5a994a411" Jul 10 00:58:49.997235 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3162150376.mount: Deactivated successfully. Jul 10 00:58:50.143177 env[1248]: time="2025-07-10T00:58:50.143141940Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:50.158648 env[1248]: time="2025-07-10T00:58:50.158615210Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cc52550d767f73458fee2ee68db9db5de30d175e8fa4569ebdb43610127b6d20,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:50.163366 env[1248]: time="2025-07-10T00:58:50.162726374Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:50.168376 env[1248]: time="2025-07-10T00:58:50.166019441Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e94d49349cc361ef2216d27dda4a097278984d778279f66e79b0616c827c6760,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:50.168376 env[1248]: time="2025-07-10T00:58:50.166165274Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\" returns image reference \"sha256:cc52550d767f73458fee2ee68db9db5de30d175e8fa4569ebdb43610127b6d20\"" Jul 10 00:58:50.384912 env[1248]: time="2025-07-10T00:58:50.384876952Z" level=info msg="CreateContainer within sandbox \"0c28f2f0415459ab02a2d50224b0083ce4134b96604c6e0a6998aecb6b1ab79b\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 10 00:58:50.404678 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount786721643.mount: Deactivated successfully. Jul 10 00:58:50.413947 env[1248]: time="2025-07-10T00:58:50.413896816Z" level=info msg="CreateContainer within sandbox \"0c28f2f0415459ab02a2d50224b0083ce4134b96604c6e0a6998aecb6b1ab79b\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"472cce3782ba5c8d4f06b781aafe60b07e229675b56e0e7763f7f6f75acee344\"" Jul 10 00:58:50.414522 env[1248]: time="2025-07-10T00:58:50.414505324Z" level=info msg="StartContainer for \"472cce3782ba5c8d4f06b781aafe60b07e229675b56e0e7763f7f6f75acee344\"" Jul 10 00:58:50.435935 systemd[1]: Started cri-containerd-472cce3782ba5c8d4f06b781aafe60b07e229675b56e0e7763f7f6f75acee344.scope. Jul 10 00:58:50.461000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.483586 kernel: kauditd_printk_skb: 40 callbacks suppressed Jul 10 00:58:50.484095 kernel: audit: type=1400 audit(1752109130.461:991): avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.484126 kernel: audit: type=1300 audit(1752109130.461:991): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f90206ecf78 items=0 ppid=2565 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:50.484146 kernel: audit: type=1327 audit(1752109130.461:991): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437326363653337383262613563386434663036623738316161666536 Jul 10 00:58:50.484163 kernel: audit: type=1400 audit(1752109130.461:992): avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.484178 kernel: audit: type=1400 audit(1752109130.461:992): avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.484223 kernel: audit: type=1400 audit(1752109130.461:992): avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.484247 kernel: audit: type=1400 audit(1752109130.461:992): avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.461000 audit[3235]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f90206ecf78 items=0 ppid=2565 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:50.490995 kernel: audit: type=1400 audit(1752109130.461:992): avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.495406 kernel: audit: type=1400 audit(1752109130.461:992): avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.505979 kernel: audit: type=1400 audit(1752109130.461:992): avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437326363653337383262613563386434663036623738316161666536 Jul 10 00:58:50.461000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.461000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.461000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.461000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.461000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.461000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.461000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.461000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.461000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.461000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.461000 audit: BPF prog-id=136 op=LOAD Jul 10 00:58:50.461000 audit[3235]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c21d8 items=0 ppid=2565 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:50.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437326363653337383262613563386434663036623738316161666536 Jul 10 00:58:50.465000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.465000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.465000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.465000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.465000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.465000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.465000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.465000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.465000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.465000 audit: BPF prog-id=137 op=LOAD Jul 10 00:58:50.465000 audit[3235]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003c2228 items=0 ppid=2565 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:50.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437326363653337383262613563386434663036623738316161666536 Jul 10 00:58:50.473000 audit: BPF prog-id=137 op=UNLOAD Jul 10 00:58:50.473000 audit: BPF prog-id=136 op=UNLOAD Jul 10 00:58:50.473000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.473000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.473000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.473000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.473000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.473000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.473000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.473000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.473000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.473000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:50.473000 audit: BPF prog-id=138 op=LOAD Jul 10 00:58:50.473000 audit[3235]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003c22b8 items=0 ppid=2565 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:50.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437326363653337383262613563386434663036623738316161666536 Jul 10 00:58:50.514870 env[1248]: time="2025-07-10T00:58:50.506645332Z" level=info msg="StartContainer for \"472cce3782ba5c8d4f06b781aafe60b07e229675b56e0e7763f7f6f75acee344\" returns successfully" Jul 10 00:58:50.790582 kubelet[2097]: I0710 00:58:50.777885 2097 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-5w498" podStartSLOduration=1.755441099 podStartE2EDuration="21.749760102s" podCreationTimestamp="2025-07-10 00:58:29 +0000 UTC" firstStartedPulling="2025-07-10 00:58:30.172504865 +0000 UTC m=+17.921902519" lastFinishedPulling="2025-07-10 00:58:50.166823874 +0000 UTC m=+37.916221522" observedRunningTime="2025-07-10 00:58:50.749414933 +0000 UTC m=+38.498812593" watchObservedRunningTime="2025-07-10 00:58:50.749760102 +0000 UTC m=+38.499157757" Jul 10 00:58:51.624882 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 10 00:58:51.624985 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 10 00:58:52.154763 env[1248]: time="2025-07-10T00:58:52.154735274Z" level=info msg="StopPodSandbox for \"7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc\"" Jul 10 00:58:52.868687 env[1248]: 2025-07-10 00:58:52.275 [INFO][3344] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" Jul 10 00:58:52.868687 env[1248]: 2025-07-10 00:58:52.276 [INFO][3344] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" iface="eth0" netns="/var/run/netns/cni-eeefc11c-7a60-b340-0180-a92f17c69135" Jul 10 00:58:52.868687 env[1248]: 2025-07-10 00:58:52.277 [INFO][3344] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" iface="eth0" netns="/var/run/netns/cni-eeefc11c-7a60-b340-0180-a92f17c69135" Jul 10 00:58:52.868687 env[1248]: 2025-07-10 00:58:52.278 [INFO][3344] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" iface="eth0" netns="/var/run/netns/cni-eeefc11c-7a60-b340-0180-a92f17c69135" Jul 10 00:58:52.868687 env[1248]: 2025-07-10 00:58:52.278 [INFO][3344] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" Jul 10 00:58:52.868687 env[1248]: 2025-07-10 00:58:52.278 [INFO][3344] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" Jul 10 00:58:52.868687 env[1248]: 2025-07-10 00:58:52.782 [INFO][3352] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" HandleID="k8s-pod-network.7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" Workload="localhost-k8s-whisker--7ccc65fc49--j64q2-eth0" Jul 10 00:58:52.868687 env[1248]: 2025-07-10 00:58:52.802 [INFO][3352] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:58:52.868687 env[1248]: 2025-07-10 00:58:52.813 [INFO][3352] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:58:52.868687 env[1248]: 2025-07-10 00:58:52.862 [WARNING][3352] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" HandleID="k8s-pod-network.7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" Workload="localhost-k8s-whisker--7ccc65fc49--j64q2-eth0" Jul 10 00:58:52.868687 env[1248]: 2025-07-10 00:58:52.862 [INFO][3352] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" HandleID="k8s-pod-network.7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" Workload="localhost-k8s-whisker--7ccc65fc49--j64q2-eth0" Jul 10 00:58:52.868687 env[1248]: 2025-07-10 00:58:52.863 [INFO][3352] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:58:52.868687 env[1248]: 2025-07-10 00:58:52.864 [INFO][3344] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" Jul 10 00:58:52.872039 systemd[1]: run-netns-cni\x2deeefc11c\x2d7a60\x2db340\x2d0180\x2da92f17c69135.mount: Deactivated successfully. Jul 10 00:58:52.873584 env[1248]: time="2025-07-10T00:58:52.872470152Z" level=info msg="TearDown network for sandbox \"7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc\" successfully" Jul 10 00:58:52.873584 env[1248]: time="2025-07-10T00:58:52.872495445Z" level=info msg="StopPodSandbox for \"7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc\" returns successfully" Jul 10 00:58:52.981391 kubelet[2097]: I0710 00:58:52.981361 2097 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a74bc768-f84b-420f-a711-e0e4f55c6504-whisker-ca-bundle\") pod \"a74bc768-f84b-420f-a711-e0e4f55c6504\" (UID: \"a74bc768-f84b-420f-a711-e0e4f55c6504\") " Jul 10 00:58:52.981998 kubelet[2097]: I0710 00:58:52.981706 2097 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/a74bc768-f84b-420f-a711-e0e4f55c6504-whisker-backend-key-pair\") pod \"a74bc768-f84b-420f-a711-e0e4f55c6504\" (UID: \"a74bc768-f84b-420f-a711-e0e4f55c6504\") " Jul 10 00:58:52.981998 kubelet[2097]: I0710 00:58:52.981731 2097 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-9cbbk\" (UniqueName: \"kubernetes.io/projected/a74bc768-f84b-420f-a711-e0e4f55c6504-kube-api-access-9cbbk\") pod \"a74bc768-f84b-420f-a711-e0e4f55c6504\" (UID: \"a74bc768-f84b-420f-a711-e0e4f55c6504\") " Jul 10 00:58:52.990364 kubelet[2097]: I0710 00:58:52.985151 2097 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/a74bc768-f84b-420f-a711-e0e4f55c6504-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "a74bc768-f84b-420f-a711-e0e4f55c6504" (UID: "a74bc768-f84b-420f-a711-e0e4f55c6504"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" Jul 10 00:58:52.995591 systemd[1]: var-lib-kubelet-pods-a74bc768\x2df84b\x2d420f\x2da711\x2de0e4f55c6504-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d9cbbk.mount: Deactivated successfully. Jul 10 00:58:52.995661 systemd[1]: var-lib-kubelet-pods-a74bc768\x2df84b\x2d420f\x2da711\x2de0e4f55c6504-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. Jul 10 00:58:52.999047 kubelet[2097]: I0710 00:58:52.999026 2097 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/a74bc768-f84b-420f-a711-e0e4f55c6504-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "a74bc768-f84b-420f-a711-e0e4f55c6504" (UID: "a74bc768-f84b-420f-a711-e0e4f55c6504"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" Jul 10 00:58:52.999482 kubelet[2097]: I0710 00:58:52.999455 2097 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/a74bc768-f84b-420f-a711-e0e4f55c6504-kube-api-access-9cbbk" (OuterVolumeSpecName: "kube-api-access-9cbbk") pod "a74bc768-f84b-420f-a711-e0e4f55c6504" (UID: "a74bc768-f84b-420f-a711-e0e4f55c6504"). InnerVolumeSpecName "kube-api-access-9cbbk". PluginName "kubernetes.io/projected", VolumeGIDValue "" Jul 10 00:58:53.082200 kubelet[2097]: I0710 00:58:53.082173 2097 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a74bc768-f84b-420f-a711-e0e4f55c6504-whisker-ca-bundle\") on node \"localhost\" DevicePath \"\"" Jul 10 00:58:53.082372 kubelet[2097]: I0710 00:58:53.082361 2097 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/a74bc768-f84b-420f-a711-e0e4f55c6504-whisker-backend-key-pair\") on node \"localhost\" DevicePath \"\"" Jul 10 00:58:53.082451 kubelet[2097]: I0710 00:58:53.082440 2097 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-9cbbk\" (UniqueName: \"kubernetes.io/projected/a74bc768-f84b-420f-a711-e0e4f55c6504-kube-api-access-9cbbk\") on node \"localhost\" DevicePath \"\"" Jul 10 00:58:53.105000 audit[3395]: AVC avc: denied { write } for pid=3395 comm="tee" name="fd" dev="proc" ino=36862 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:58:53.105000 audit[3395]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc239907f3 a2=241 a3=1b6 items=1 ppid=3374 pid=3395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.105000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 10 00:58:53.105000 audit: PATH item=0 name="/dev/fd/63" inode=36850 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:58:53.105000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:58:53.117000 audit[3422]: AVC avc: denied { write } for pid=3422 comm="tee" name="fd" dev="proc" ino=37901 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:58:53.117000 audit[3422]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9688d7f1 a2=241 a3=1b6 items=1 ppid=3369 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.117000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 10 00:58:53.117000 audit: PATH item=0 name="/dev/fd/63" inode=37896 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:58:53.117000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:58:53.118000 audit[3425]: AVC avc: denied { write } for pid=3425 comm="tee" name="fd" dev="proc" ino=37905 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:58:53.118000 audit[3425]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff4aa597f1 a2=241 a3=1b6 items=1 ppid=3379 pid=3425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.118000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 10 00:58:53.118000 audit: PATH item=0 name="/dev/fd/63" inode=36920 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:58:53.118000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:58:53.140000 audit[3433]: AVC avc: denied { write } for pid=3433 comm="tee" name="fd" dev="proc" ino=37917 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:58:53.140000 audit[3433]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe004887e2 a2=241 a3=1b6 items=1 ppid=3371 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.140000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 10 00:58:53.140000 audit: PATH item=0 name="/dev/fd/63" inode=36923 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:58:53.140000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:58:53.144000 audit[3439]: AVC avc: denied { write } for pid=3439 comm="tee" name="fd" dev="proc" ino=37926 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:58:53.144000 audit[3439]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff6fdae7f1 a2=241 a3=1b6 items=1 ppid=3377 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.144000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 10 00:58:53.144000 audit: PATH item=0 name="/dev/fd/63" inode=37921 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:58:53.144000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:58:53.156000 audit[3443]: AVC avc: denied { write } for pid=3443 comm="tee" name="fd" dev="proc" ino=37934 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:58:53.156000 audit[3443]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe51d2c7f2 a2=241 a3=1b6 items=1 ppid=3384 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.156000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 10 00:58:53.156000 audit: PATH item=0 name="/dev/fd/63" inode=36926 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:58:53.156000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:58:53.157000 audit[3445]: AVC avc: denied { write } for pid=3445 comm="tee" name="fd" dev="proc" ino=37938 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:58:53.157000 audit[3445]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9ee927e1 a2=241 a3=1b6 items=1 ppid=3399 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.157000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 10 00:58:53.157000 audit: PATH item=0 name="/dev/fd/63" inode=36927 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:58:53.157000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:58:53.416000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.416000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.416000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.416000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.416000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.416000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.416000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.416000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.416000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.416000 audit: BPF prog-id=139 op=LOAD Jul 10 00:58:53.416000 audit[3459]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff58143730 a2=98 a3=1fffffffffffffff items=0 ppid=3380 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.416000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 10 00:58:53.417000 audit: BPF prog-id=139 op=UNLOAD Jul 10 00:58:53.419000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.419000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.419000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.419000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.419000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.419000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.419000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.419000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.419000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.419000 audit: BPF prog-id=140 op=LOAD Jul 10 00:58:53.419000 audit[3459]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff58143610 a2=94 a3=3 items=0 ppid=3380 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.419000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 10 00:58:53.421000 audit: BPF prog-id=140 op=UNLOAD Jul 10 00:58:53.421000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.421000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.421000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.421000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.421000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.421000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.421000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.421000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.421000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.421000 audit: BPF prog-id=141 op=LOAD Jul 10 00:58:53.421000 audit[3459]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff58143650 a2=94 a3=7fff58143830 items=0 ppid=3380 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.421000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 10 00:58:53.425000 audit: BPF prog-id=141 op=UNLOAD Jul 10 00:58:53.425000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.425000 audit[3459]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff58143720 a2=50 a3=a000000085 items=0 ppid=3380 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.425000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 10 00:58:53.432000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.432000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.432000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.432000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.432000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.432000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.432000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.432000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.432000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.432000 audit: BPF prog-id=142 op=LOAD Jul 10 00:58:53.432000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd575e40e0 a2=98 a3=3 items=0 ppid=3380 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.432000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:58:53.432000 audit: BPF prog-id=142 op=UNLOAD Jul 10 00:58:53.433000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.433000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.433000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.433000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.433000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.433000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.433000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.433000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.433000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.433000 audit: BPF prog-id=143 op=LOAD Jul 10 00:58:53.433000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd575e3ed0 a2=94 a3=54428f items=0 ppid=3380 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.433000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:58:53.433000 audit: BPF prog-id=143 op=UNLOAD Jul 10 00:58:53.433000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.433000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.433000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.433000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.433000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.433000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.433000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.433000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.433000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.433000 audit: BPF prog-id=144 op=LOAD Jul 10 00:58:53.433000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd575e3f00 a2=94 a3=2 items=0 ppid=3380 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.433000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:58:53.433000 audit: BPF prog-id=144 op=UNLOAD Jul 10 00:58:53.509000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.509000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.509000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.509000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.509000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.509000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.509000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.509000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.509000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.509000 audit: BPF prog-id=145 op=LOAD Jul 10 00:58:53.509000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd575e3dc0 a2=94 a3=1 items=0 ppid=3380 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.509000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:58:53.509000 audit: BPF prog-id=145 op=UNLOAD Jul 10 00:58:53.509000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.509000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd575e3e90 a2=50 a3=7ffd575e3f70 items=0 ppid=3380 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.509000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:58:53.516000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.516000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd575e3dd0 a2=28 a3=0 items=0 ppid=3380 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.516000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:58:53.516000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.516000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd575e3e00 a2=28 a3=0 items=0 ppid=3380 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.516000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:58:53.516000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.516000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd575e3d10 a2=28 a3=0 items=0 ppid=3380 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.516000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:58:53.516000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.516000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd575e3e20 a2=28 a3=0 items=0 ppid=3380 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.516000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:58:53.516000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.516000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd575e3e00 a2=28 a3=0 items=0 ppid=3380 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.516000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:58:53.516000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.516000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd575e3df0 a2=28 a3=0 items=0 ppid=3380 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.516000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:58:53.516000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.516000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd575e3e20 a2=28 a3=0 items=0 ppid=3380 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.516000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:58:53.516000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.516000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd575e3e00 a2=28 a3=0 items=0 ppid=3380 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.516000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:58:53.516000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.516000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd575e3e20 a2=28 a3=0 items=0 ppid=3380 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.516000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:58:53.516000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.516000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd575e3df0 a2=28 a3=0 items=0 ppid=3380 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.516000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd575e3e60 a2=28 a3=0 items=0 ppid=3380 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.517000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd575e3c10 a2=50 a3=1 items=0 ppid=3380 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.517000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit: BPF prog-id=146 op=LOAD Jul 10 00:58:53.517000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd575e3c10 a2=94 a3=5 items=0 ppid=3380 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.517000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:58:53.517000 audit: BPF prog-id=146 op=UNLOAD Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd575e3cc0 a2=50 a3=1 items=0 ppid=3380 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.517000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd575e3de0 a2=4 a3=38 items=0 ppid=3380 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.517000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:58:53.517000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd575e3e30 a2=94 a3=6 items=0 ppid=3380 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.517000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:58:53.517000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd575e35e0 a2=94 a3=88 items=0 ppid=3380 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.517000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.517000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:58:53.517000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd575e35e0 a2=94 a3=88 items=0 ppid=3380 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.517000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit: BPF prog-id=147 op=LOAD Jul 10 00:58:53.545000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe16dd4ff0 a2=98 a3=1999999999999999 items=0 ppid=3380 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.545000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 10 00:58:53.545000 audit: BPF prog-id=147 op=UNLOAD Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit: BPF prog-id=148 op=LOAD Jul 10 00:58:53.545000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe16dd4ed0 a2=94 a3=ffff items=0 ppid=3380 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.545000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 10 00:58:53.545000 audit: BPF prog-id=148 op=UNLOAD Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.545000 audit: BPF prog-id=149 op=LOAD Jul 10 00:58:53.545000 audit[3481]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe16dd4f10 a2=94 a3=7ffe16dd50f0 items=0 ppid=3380 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.545000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 10 00:58:53.545000 audit: BPF prog-id=149 op=UNLOAD Jul 10 00:58:53.675000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.675000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.675000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.675000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.675000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.675000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.675000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.675000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.675000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.675000 audit: BPF prog-id=150 op=LOAD Jul 10 00:58:53.675000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe4c8770f0 a2=98 a3=0 items=0 ppid=3380 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.675000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:58:53.676000 audit: BPF prog-id=150 op=UNLOAD Jul 10 00:58:53.695000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.695000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.695000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.695000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.695000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.695000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.695000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.695000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.695000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.695000 audit: BPF prog-id=151 op=LOAD Jul 10 00:58:53.695000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe4c876f00 a2=94 a3=54428f items=0 ppid=3380 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.695000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:58:53.696000 audit: BPF prog-id=151 op=UNLOAD Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit: BPF prog-id=152 op=LOAD Jul 10 00:58:53.696000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe4c876f30 a2=94 a3=2 items=0 ppid=3380 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:58:53.696000 audit: BPF prog-id=152 op=UNLOAD Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe4c876e00 a2=28 a3=0 items=0 ppid=3380 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4c876e30 a2=28 a3=0 items=0 ppid=3380 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4c876d40 a2=28 a3=0 items=0 ppid=3380 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe4c876e50 a2=28 a3=0 items=0 ppid=3380 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe4c876e30 a2=28 a3=0 items=0 ppid=3380 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe4c876e20 a2=28 a3=0 items=0 ppid=3380 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe4c876e50 a2=28 a3=0 items=0 ppid=3380 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4c876e30 a2=28 a3=0 items=0 ppid=3380 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4c876e50 a2=28 a3=0 items=0 ppid=3380 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4c876e20 a2=28 a3=0 items=0 ppid=3380 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe4c876e90 a2=28 a3=0 items=0 ppid=3380 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.696000 audit: BPF prog-id=153 op=LOAD Jul 10 00:58:53.696000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe4c876d00 a2=94 a3=0 items=0 ppid=3380 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:58:53.696000 audit: BPF prog-id=153 op=UNLOAD Jul 10 00:58:53.697000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.697000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe4c876cf0 a2=50 a3=2800 items=0 ppid=3380 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.697000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:58:53.697000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.697000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe4c876cf0 a2=50 a3=2800 items=0 ppid=3380 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.697000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:58:53.697000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.697000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.697000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.697000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.697000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.697000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.697000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.697000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.697000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.697000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.697000 audit: BPF prog-id=154 op=LOAD Jul 10 00:58:53.697000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe4c876510 a2=94 a3=2 items=0 ppid=3380 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.697000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:58:53.697000 audit: BPF prog-id=154 op=UNLOAD Jul 10 00:58:53.697000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.697000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.697000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.697000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.697000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.697000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.697000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.697000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.697000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.697000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.697000 audit: BPF prog-id=155 op=LOAD Jul 10 00:58:53.697000 audit[3510]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe4c876610 a2=94 a3=30 items=0 ppid=3380 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.697000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:58:53.699000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.699000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.699000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.699000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.699000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.699000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.699000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.699000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.699000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.699000 audit: BPF prog-id=156 op=LOAD Jul 10 00:58:53.699000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe22e09590 a2=98 a3=0 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.699000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.699000 audit: BPF prog-id=156 op=UNLOAD Jul 10 00:58:53.700000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.700000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.700000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.700000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.700000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.700000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.700000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.700000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.700000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.700000 audit: BPF prog-id=157 op=LOAD Jul 10 00:58:53.700000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe22e09380 a2=94 a3=54428f items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.700000 audit: BPF prog-id=157 op=UNLOAD Jul 10 00:58:53.700000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.700000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.700000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.700000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.700000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.700000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.700000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.700000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.700000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.700000 audit: BPF prog-id=158 op=LOAD Jul 10 00:58:53.700000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe22e093b0 a2=94 a3=2 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.700000 audit: BPF prog-id=158 op=UNLOAD Jul 10 00:58:53.723572 systemd-networkd[1059]: vxlan.calico: Link UP Jul 10 00:58:53.723574 systemd-networkd[1059]: vxlan.calico: Gained carrier Jul 10 00:58:53.758544 systemd[1]: Removed slice kubepods-besteffort-poda74bc768_f84b_420f_a711_e0e4f55c6504.slice. Jul 10 00:58:53.826000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.826000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.826000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.826000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.826000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.826000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.826000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.826000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.826000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.826000 audit: BPF prog-id=159 op=LOAD Jul 10 00:58:53.826000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe22e09270 a2=94 a3=1 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.826000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.827000 audit: BPF prog-id=159 op=UNLOAD Jul 10 00:58:53.827000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.827000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe22e09340 a2=50 a3=7ffe22e09420 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.827000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.834000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.834000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe22e09280 a2=28 a3=0 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.834000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.834000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.834000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe22e092b0 a2=28 a3=0 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.834000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.835000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.835000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe22e091c0 a2=28 a3=0 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.835000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.835000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.835000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe22e092d0 a2=28 a3=0 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.835000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.835000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.835000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe22e092b0 a2=28 a3=0 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.835000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.835000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.835000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe22e092a0 a2=28 a3=0 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.835000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.835000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.835000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe22e092d0 a2=28 a3=0 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.835000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.835000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.835000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe22e092b0 a2=28 a3=0 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.835000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.835000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.835000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe22e092d0 a2=28 a3=0 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.835000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.836000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.836000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe22e092a0 a2=28 a3=0 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.836000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.836000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe22e09310 a2=28 a3=0 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.836000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.836000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe22e090c0 a2=50 a3=1 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.836000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.836000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.836000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.836000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.836000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.836000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.836000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.836000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.836000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.836000 audit: BPF prog-id=160 op=LOAD Jul 10 00:58:53.836000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe22e090c0 a2=94 a3=5 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.837000 audit: BPF prog-id=160 op=UNLOAD Jul 10 00:58:53.837000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.837000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe22e09170 a2=50 a3=1 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.837000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.837000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe22e09290 a2=4 a3=38 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.837000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.837000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.837000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.837000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.837000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.837000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.837000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.837000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.837000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.837000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.837000 audit[3512]: AVC avc: denied { confidentiality } for pid=3512 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:58:53.837000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe22e092e0 a2=94 a3=6 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.837000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.837000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.837000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.837000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.837000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.837000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.837000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.837000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.837000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.837000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.837000 audit[3512]: AVC avc: denied { confidentiality } for pid=3512 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:58:53.837000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe22e08a90 a2=94 a3=88 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.838000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.838000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.838000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.838000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.838000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.838000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.838000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.838000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.838000 audit[3512]: AVC avc: denied { perfmon } for pid=3512 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.838000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.838000 audit[3512]: AVC avc: denied { confidentiality } for pid=3512 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:58:53.838000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe22e08a90 a2=94 a3=88 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.838000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.839000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.839000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe22e0a4c0 a2=10 a3=f8f00800 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.839000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.839000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.839000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe22e0a360 a2=10 a3=3 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.839000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.839000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.839000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe22e0a300 a2=10 a3=3 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.839000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.839000 audit[3512]: AVC avc: denied { bpf } for pid=3512 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:53.839000 audit[3512]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe22e0a300 a2=10 a3=7 items=0 ppid=3380 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:53.839000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:58:53.845000 audit: BPF prog-id=155 op=UNLOAD Jul 10 00:58:54.015956 systemd[1]: Created slice kubepods-besteffort-pod9ee77dfb_11ff_47ed_bd46_6dc178781022.slice. Jul 10 00:58:54.029000 audit[3547]: NETFILTER_CFG table=mangle:99 family=2 entries=16 op=nft_register_chain pid=3547 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:58:54.029000 audit[3547]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fffc85742b0 a2=0 a3=7fffc857429c items=0 ppid=3380 pid=3547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:54.029000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:58:54.049000 audit[3548]: NETFILTER_CFG table=nat:100 family=2 entries=15 op=nft_register_chain pid=3548 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:58:54.049000 audit[3548]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe03fc6cc0 a2=0 a3=7ffe03fc6cac items=0 ppid=3380 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:54.049000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:58:54.050000 audit[3546]: NETFILTER_CFG table=filter:101 family=2 entries=39 op=nft_register_chain pid=3546 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:58:54.050000 audit[3546]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc7677d080 a2=0 a3=7ffc7677d06c items=0 ppid=3380 pid=3546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:54.050000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:58:54.067000 audit[3545]: NETFILTER_CFG table=raw:102 family=2 entries=21 op=nft_register_chain pid=3545 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:58:54.067000 audit[3545]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff62745750 a2=0 a3=7fff6274573c items=0 ppid=3380 pid=3545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:54.067000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:58:54.099311 kubelet[2097]: I0710 00:58:54.099288 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n5jcg\" (UniqueName: \"kubernetes.io/projected/9ee77dfb-11ff-47ed-bd46-6dc178781022-kube-api-access-n5jcg\") pod \"whisker-69bf9845cf-g9v7w\" (UID: \"9ee77dfb-11ff-47ed-bd46-6dc178781022\") " pod="calico-system/whisker-69bf9845cf-g9v7w" Jul 10 00:58:54.099606 kubelet[2097]: I0710 00:58:54.099594 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9ee77dfb-11ff-47ed-bd46-6dc178781022-whisker-ca-bundle\") pod \"whisker-69bf9845cf-g9v7w\" (UID: \"9ee77dfb-11ff-47ed-bd46-6dc178781022\") " pod="calico-system/whisker-69bf9845cf-g9v7w" Jul 10 00:58:54.099672 kubelet[2097]: I0710 00:58:54.099662 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/9ee77dfb-11ff-47ed-bd46-6dc178781022-whisker-backend-key-pair\") pod \"whisker-69bf9845cf-g9v7w\" (UID: \"9ee77dfb-11ff-47ed-bd46-6dc178781022\") " pod="calico-system/whisker-69bf9845cf-g9v7w" Jul 10 00:58:54.341810 env[1248]: time="2025-07-10T00:58:54.341209674Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-69bf9845cf-g9v7w,Uid:9ee77dfb-11ff-47ed-bd46-6dc178781022,Namespace:calico-system,Attempt:0,}" Jul 10 00:58:54.418268 kubelet[2097]: I0710 00:58:54.418193 2097 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="a74bc768-f84b-420f-a711-e0e4f55c6504" path="/var/lib/kubelet/pods/a74bc768-f84b-420f-a711-e0e4f55c6504/volumes" Jul 10 00:58:54.525232 systemd-networkd[1059]: cali1386292c8f2: Link UP Jul 10 00:58:54.527882 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1386292c8f2: link becomes ready Jul 10 00:58:54.527740 systemd-networkd[1059]: cali1386292c8f2: Gained carrier Jul 10 00:58:54.540885 env[1248]: 2025-07-10 00:58:54.384 [INFO][3561] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-whisker--69bf9845cf--g9v7w-eth0 whisker-69bf9845cf- calico-system 9ee77dfb-11ff-47ed-bd46-6dc178781022 939 0 2025-07-10 00:58:53 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:69bf9845cf projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s localhost whisker-69bf9845cf-g9v7w eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali1386292c8f2 [] [] }} ContainerID="11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3" Namespace="calico-system" Pod="whisker-69bf9845cf-g9v7w" WorkloadEndpoint="localhost-k8s-whisker--69bf9845cf--g9v7w-" Jul 10 00:58:54.540885 env[1248]: 2025-07-10 00:58:54.384 [INFO][3561] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3" Namespace="calico-system" Pod="whisker-69bf9845cf-g9v7w" WorkloadEndpoint="localhost-k8s-whisker--69bf9845cf--g9v7w-eth0" Jul 10 00:58:54.540885 env[1248]: 2025-07-10 00:58:54.426 [INFO][3574] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3" HandleID="k8s-pod-network.11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3" Workload="localhost-k8s-whisker--69bf9845cf--g9v7w-eth0" Jul 10 00:58:54.540885 env[1248]: 2025-07-10 00:58:54.426 [INFO][3574] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3" HandleID="k8s-pod-network.11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3" Workload="localhost-k8s-whisker--69bf9845cf--g9v7w-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4ff0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"whisker-69bf9845cf-g9v7w", "timestamp":"2025-07-10 00:58:54.426388057 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:58:54.540885 env[1248]: 2025-07-10 00:58:54.426 [INFO][3574] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:58:54.540885 env[1248]: 2025-07-10 00:58:54.426 [INFO][3574] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:58:54.540885 env[1248]: 2025-07-10 00:58:54.426 [INFO][3574] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Jul 10 00:58:54.540885 env[1248]: 2025-07-10 00:58:54.435 [INFO][3574] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3" host="localhost" Jul 10 00:58:54.540885 env[1248]: 2025-07-10 00:58:54.497 [INFO][3574] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Jul 10 00:58:54.540885 env[1248]: 2025-07-10 00:58:54.502 [INFO][3574] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Jul 10 00:58:54.540885 env[1248]: 2025-07-10 00:58:54.503 [INFO][3574] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Jul 10 00:58:54.540885 env[1248]: 2025-07-10 00:58:54.505 [INFO][3574] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Jul 10 00:58:54.540885 env[1248]: 2025-07-10 00:58:54.505 [INFO][3574] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3" host="localhost" Jul 10 00:58:54.540885 env[1248]: 2025-07-10 00:58:54.509 [INFO][3574] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3 Jul 10 00:58:54.540885 env[1248]: 2025-07-10 00:58:54.513 [INFO][3574] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3" host="localhost" Jul 10 00:58:54.540885 env[1248]: 2025-07-10 00:58:54.517 [INFO][3574] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3" host="localhost" Jul 10 00:58:54.540885 env[1248]: 2025-07-10 00:58:54.517 [INFO][3574] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3" host="localhost" Jul 10 00:58:54.540885 env[1248]: 2025-07-10 00:58:54.517 [INFO][3574] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:58:54.540885 env[1248]: 2025-07-10 00:58:54.517 [INFO][3574] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3" HandleID="k8s-pod-network.11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3" Workload="localhost-k8s-whisker--69bf9845cf--g9v7w-eth0" Jul 10 00:58:54.542141 env[1248]: 2025-07-10 00:58:54.520 [INFO][3561] cni-plugin/k8s.go 418: Populated endpoint ContainerID="11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3" Namespace="calico-system" Pod="whisker-69bf9845cf-g9v7w" WorkloadEndpoint="localhost-k8s-whisker--69bf9845cf--g9v7w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-whisker--69bf9845cf--g9v7w-eth0", GenerateName:"whisker-69bf9845cf-", Namespace:"calico-system", SelfLink:"", UID:"9ee77dfb-11ff-47ed-bd46-6dc178781022", ResourceVersion:"939", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"69bf9845cf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"whisker-69bf9845cf-g9v7w", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali1386292c8f2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:58:54.542141 env[1248]: 2025-07-10 00:58:54.520 [INFO][3561] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.129/32] ContainerID="11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3" Namespace="calico-system" Pod="whisker-69bf9845cf-g9v7w" WorkloadEndpoint="localhost-k8s-whisker--69bf9845cf--g9v7w-eth0" Jul 10 00:58:54.542141 env[1248]: 2025-07-10 00:58:54.520 [INFO][3561] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1386292c8f2 ContainerID="11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3" Namespace="calico-system" Pod="whisker-69bf9845cf-g9v7w" WorkloadEndpoint="localhost-k8s-whisker--69bf9845cf--g9v7w-eth0" Jul 10 00:58:54.542141 env[1248]: 2025-07-10 00:58:54.530 [INFO][3561] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3" Namespace="calico-system" Pod="whisker-69bf9845cf-g9v7w" WorkloadEndpoint="localhost-k8s-whisker--69bf9845cf--g9v7w-eth0" Jul 10 00:58:54.542141 env[1248]: 2025-07-10 00:58:54.530 [INFO][3561] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3" Namespace="calico-system" Pod="whisker-69bf9845cf-g9v7w" WorkloadEndpoint="localhost-k8s-whisker--69bf9845cf--g9v7w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-whisker--69bf9845cf--g9v7w-eth0", GenerateName:"whisker-69bf9845cf-", Namespace:"calico-system", SelfLink:"", UID:"9ee77dfb-11ff-47ed-bd46-6dc178781022", ResourceVersion:"939", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"69bf9845cf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3", Pod:"whisker-69bf9845cf-g9v7w", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali1386292c8f2", MAC:"b6:bb:83:64:6a:5d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:58:54.542141 env[1248]: 2025-07-10 00:58:54.538 [INFO][3561] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3" Namespace="calico-system" Pod="whisker-69bf9845cf-g9v7w" WorkloadEndpoint="localhost-k8s-whisker--69bf9845cf--g9v7w-eth0" Jul 10 00:58:54.551690 env[1248]: time="2025-07-10T00:58:54.551621786Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:58:54.551690 env[1248]: time="2025-07-10T00:58:54.551688404Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:58:54.551814 env[1248]: time="2025-07-10T00:58:54.551704316Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:58:54.551978 env[1248]: time="2025-07-10T00:58:54.551938720Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3 pid=3595 runtime=io.containerd.runc.v2 Jul 10 00:58:54.578811 systemd[1]: Started cri-containerd-11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3.scope. Jul 10 00:58:54.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.587000 audit: BPF prog-id=161 op=LOAD Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3595 pid=3606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:54.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131333937333431636634636161623464346436383763656136613364 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3595 pid=3606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:54.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131333937333431636634636161623464346436383763656136613364 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit: BPF prog-id=162 op=LOAD Jul 10 00:58:54.588000 audit[3606]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003946a0 items=0 ppid=3595 pid=3606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:54.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131333937333431636634636161623464346436383763656136613364 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit: BPF prog-id=163 op=LOAD Jul 10 00:58:54.588000 audit[3606]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003946e8 items=0 ppid=3595 pid=3606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:54.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131333937333431636634636161623464346436383763656136613364 Jul 10 00:58:54.588000 audit: BPF prog-id=163 op=UNLOAD Jul 10 00:58:54.588000 audit: BPF prog-id=162 op=UNLOAD Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:54.588000 audit: BPF prog-id=164 op=LOAD Jul 10 00:58:54.588000 audit[3606]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000394af8 items=0 ppid=3595 pid=3606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:54.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131333937333431636634636161623464346436383763656136613364 Jul 10 00:58:54.594545 systemd-resolved[1203]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:58:54.605000 audit[3625]: NETFILTER_CFG table=filter:103 family=2 entries=59 op=nft_register_chain pid=3625 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:58:54.605000 audit[3625]: SYSCALL arch=c000003e syscall=46 success=yes exit=35860 a0=3 a1=7ffd3bd8a670 a2=0 a3=7ffd3bd8a65c items=0 ppid=3380 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:54.605000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:58:54.625378 env[1248]: time="2025-07-10T00:58:54.625327039Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-69bf9845cf-g9v7w,Uid:9ee77dfb-11ff-47ed-bd46-6dc178781022,Namespace:calico-system,Attempt:0,} returns sandbox id \"11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3\"" Jul 10 00:58:54.632478 env[1248]: time="2025-07-10T00:58:54.632451458Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.2\"" Jul 10 00:58:55.256460 systemd-networkd[1059]: vxlan.calico: Gained IPv6LL Jul 10 00:58:55.416057 env[1248]: time="2025-07-10T00:58:55.416033478Z" level=info msg="StopPodSandbox for \"76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b\"" Jul 10 00:58:55.416448 env[1248]: time="2025-07-10T00:58:55.416425715Z" level=info msg="StopPodSandbox for \"0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b\"" Jul 10 00:58:55.533465 env[1248]: 2025-07-10 00:58:55.479 [INFO][3654] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" Jul 10 00:58:55.533465 env[1248]: 2025-07-10 00:58:55.479 [INFO][3654] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" iface="eth0" netns="/var/run/netns/cni-ea59d492-767c-fea8-a556-9e444023bc40" Jul 10 00:58:55.533465 env[1248]: 2025-07-10 00:58:55.479 [INFO][3654] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" iface="eth0" netns="/var/run/netns/cni-ea59d492-767c-fea8-a556-9e444023bc40" Jul 10 00:58:55.533465 env[1248]: 2025-07-10 00:58:55.480 [INFO][3654] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" iface="eth0" netns="/var/run/netns/cni-ea59d492-767c-fea8-a556-9e444023bc40" Jul 10 00:58:55.533465 env[1248]: 2025-07-10 00:58:55.480 [INFO][3654] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" Jul 10 00:58:55.533465 env[1248]: 2025-07-10 00:58:55.480 [INFO][3654] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" Jul 10 00:58:55.533465 env[1248]: 2025-07-10 00:58:55.514 [INFO][3675] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" HandleID="k8s-pod-network.76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" Workload="localhost-k8s-coredns--668d6bf9bc--b47q7-eth0" Jul 10 00:58:55.533465 env[1248]: 2025-07-10 00:58:55.515 [INFO][3675] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:58:55.533465 env[1248]: 2025-07-10 00:58:55.515 [INFO][3675] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:58:55.533465 env[1248]: 2025-07-10 00:58:55.525 [WARNING][3675] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" HandleID="k8s-pod-network.76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" Workload="localhost-k8s-coredns--668d6bf9bc--b47q7-eth0" Jul 10 00:58:55.533465 env[1248]: 2025-07-10 00:58:55.525 [INFO][3675] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" HandleID="k8s-pod-network.76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" Workload="localhost-k8s-coredns--668d6bf9bc--b47q7-eth0" Jul 10 00:58:55.533465 env[1248]: 2025-07-10 00:58:55.526 [INFO][3675] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:58:55.533465 env[1248]: 2025-07-10 00:58:55.531 [INFO][3654] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" Jul 10 00:58:55.536002 systemd[1]: run-netns-cni\x2dea59d492\x2d767c\x2dfea8\x2da556\x2d9e444023bc40.mount: Deactivated successfully. Jul 10 00:58:55.537392 env[1248]: time="2025-07-10T00:58:55.537356070Z" level=info msg="TearDown network for sandbox \"76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b\" successfully" Jul 10 00:58:55.537479 env[1248]: time="2025-07-10T00:58:55.537391515Z" level=info msg="StopPodSandbox for \"76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b\" returns successfully" Jul 10 00:58:55.538144 env[1248]: time="2025-07-10T00:58:55.538119614Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-b47q7,Uid:1d40f785-0a7b-4a11-9275-67e6b3486e34,Namespace:kube-system,Attempt:1,}" Jul 10 00:58:55.549095 env[1248]: 2025-07-10 00:58:55.474 [INFO][3661] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" Jul 10 00:58:55.549095 env[1248]: 2025-07-10 00:58:55.474 [INFO][3661] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" iface="eth0" netns="/var/run/netns/cni-9fa2c4f9-6c53-cb72-ae9d-8ace79ccac11" Jul 10 00:58:55.549095 env[1248]: 2025-07-10 00:58:55.474 [INFO][3661] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" iface="eth0" netns="/var/run/netns/cni-9fa2c4f9-6c53-cb72-ae9d-8ace79ccac11" Jul 10 00:58:55.549095 env[1248]: 2025-07-10 00:58:55.474 [INFO][3661] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" iface="eth0" netns="/var/run/netns/cni-9fa2c4f9-6c53-cb72-ae9d-8ace79ccac11" Jul 10 00:58:55.549095 env[1248]: 2025-07-10 00:58:55.474 [INFO][3661] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" Jul 10 00:58:55.549095 env[1248]: 2025-07-10 00:58:55.474 [INFO][3661] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" Jul 10 00:58:55.549095 env[1248]: 2025-07-10 00:58:55.525 [INFO][3670] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" HandleID="k8s-pod-network.0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" Workload="localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-eth0" Jul 10 00:58:55.549095 env[1248]: 2025-07-10 00:58:55.525 [INFO][3670] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:58:55.549095 env[1248]: 2025-07-10 00:58:55.526 [INFO][3670] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:58:55.549095 env[1248]: 2025-07-10 00:58:55.533 [WARNING][3670] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" HandleID="k8s-pod-network.0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" Workload="localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-eth0" Jul 10 00:58:55.549095 env[1248]: 2025-07-10 00:58:55.533 [INFO][3670] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" HandleID="k8s-pod-network.0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" Workload="localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-eth0" Jul 10 00:58:55.549095 env[1248]: 2025-07-10 00:58:55.537 [INFO][3670] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:58:55.549095 env[1248]: 2025-07-10 00:58:55.547 [INFO][3661] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" Jul 10 00:58:55.551116 systemd[1]: run-netns-cni\x2d9fa2c4f9\x2d6c53\x2dcb72\x2dae9d\x2d8ace79ccac11.mount: Deactivated successfully. Jul 10 00:58:55.555717 env[1248]: time="2025-07-10T00:58:55.555685279Z" level=info msg="TearDown network for sandbox \"0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b\" successfully" Jul 10 00:58:55.555798 env[1248]: time="2025-07-10T00:58:55.555724806Z" level=info msg="StopPodSandbox for \"0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b\" returns successfully" Jul 10 00:58:55.556308 env[1248]: time="2025-07-10T00:58:55.556285315Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65594c9c4c-wld2r,Uid:79c54820-9de2-4eff-9b0c-ba6143dd7d8d,Namespace:calico-system,Attempt:1,}" Jul 10 00:58:55.655628 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 10 00:58:55.655703 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali773531f53f6: link becomes ready Jul 10 00:58:55.655752 systemd-networkd[1059]: cali773531f53f6: Link UP Jul 10 00:58:55.655870 systemd-networkd[1059]: cali773531f53f6: Gained carrier Jul 10 00:58:55.668254 env[1248]: 2025-07-10 00:58:55.591 [INFO][3683] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--b47q7-eth0 coredns-668d6bf9bc- kube-system 1d40f785-0a7b-4a11-9275-67e6b3486e34 950 0 2025-07-10 00:58:18 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-b47q7 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali773531f53f6 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e" Namespace="kube-system" Pod="coredns-668d6bf9bc-b47q7" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--b47q7-" Jul 10 00:58:55.668254 env[1248]: 2025-07-10 00:58:55.591 [INFO][3683] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e" Namespace="kube-system" Pod="coredns-668d6bf9bc-b47q7" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--b47q7-eth0" Jul 10 00:58:55.668254 env[1248]: 2025-07-10 00:58:55.619 [INFO][3706] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e" HandleID="k8s-pod-network.d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e" Workload="localhost-k8s-coredns--668d6bf9bc--b47q7-eth0" Jul 10 00:58:55.668254 env[1248]: 2025-07-10 00:58:55.619 [INFO][3706] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e" HandleID="k8s-pod-network.d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e" Workload="localhost-k8s-coredns--668d6bf9bc--b47q7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000251270), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-b47q7", "timestamp":"2025-07-10 00:58:55.619675811 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:58:55.668254 env[1248]: 2025-07-10 00:58:55.619 [INFO][3706] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:58:55.668254 env[1248]: 2025-07-10 00:58:55.619 [INFO][3706] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:58:55.668254 env[1248]: 2025-07-10 00:58:55.619 [INFO][3706] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Jul 10 00:58:55.668254 env[1248]: 2025-07-10 00:58:55.623 [INFO][3706] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e" host="localhost" Jul 10 00:58:55.668254 env[1248]: 2025-07-10 00:58:55.626 [INFO][3706] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Jul 10 00:58:55.668254 env[1248]: 2025-07-10 00:58:55.634 [INFO][3706] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Jul 10 00:58:55.668254 env[1248]: 2025-07-10 00:58:55.635 [INFO][3706] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Jul 10 00:58:55.668254 env[1248]: 2025-07-10 00:58:55.636 [INFO][3706] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Jul 10 00:58:55.668254 env[1248]: 2025-07-10 00:58:55.636 [INFO][3706] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e" host="localhost" Jul 10 00:58:55.668254 env[1248]: 2025-07-10 00:58:55.637 [INFO][3706] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e Jul 10 00:58:55.668254 env[1248]: 2025-07-10 00:58:55.640 [INFO][3706] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e" host="localhost" Jul 10 00:58:55.668254 env[1248]: 2025-07-10 00:58:55.648 [INFO][3706] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e" host="localhost" Jul 10 00:58:55.668254 env[1248]: 2025-07-10 00:58:55.648 [INFO][3706] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e" host="localhost" Jul 10 00:58:55.668254 env[1248]: 2025-07-10 00:58:55.648 [INFO][3706] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:58:55.668254 env[1248]: 2025-07-10 00:58:55.648 [INFO][3706] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e" HandleID="k8s-pod-network.d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e" Workload="localhost-k8s-coredns--668d6bf9bc--b47q7-eth0" Jul 10 00:58:55.668775 env[1248]: 2025-07-10 00:58:55.651 [INFO][3683] cni-plugin/k8s.go 418: Populated endpoint ContainerID="d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e" Namespace="kube-system" Pod="coredns-668d6bf9bc-b47q7" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--b47q7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--b47q7-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"1d40f785-0a7b-4a11-9275-67e6b3486e34", ResourceVersion:"950", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-b47q7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali773531f53f6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:58:55.668775 env[1248]: 2025-07-10 00:58:55.651 [INFO][3683] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.130/32] ContainerID="d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e" Namespace="kube-system" Pod="coredns-668d6bf9bc-b47q7" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--b47q7-eth0" Jul 10 00:58:55.668775 env[1248]: 2025-07-10 00:58:55.651 [INFO][3683] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali773531f53f6 ContainerID="d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e" Namespace="kube-system" Pod="coredns-668d6bf9bc-b47q7" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--b47q7-eth0" Jul 10 00:58:55.668775 env[1248]: 2025-07-10 00:58:55.657 [INFO][3683] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e" Namespace="kube-system" Pod="coredns-668d6bf9bc-b47q7" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--b47q7-eth0" Jul 10 00:58:55.668775 env[1248]: 2025-07-10 00:58:55.658 [INFO][3683] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e" Namespace="kube-system" Pod="coredns-668d6bf9bc-b47q7" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--b47q7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--b47q7-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"1d40f785-0a7b-4a11-9275-67e6b3486e34", ResourceVersion:"950", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e", Pod:"coredns-668d6bf9bc-b47q7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali773531f53f6", MAC:"8e:67:9c:b1:58:6d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:58:55.668950 env[1248]: 2025-07-10 00:58:55.666 [INFO][3683] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e" Namespace="kube-system" Pod="coredns-668d6bf9bc-b47q7" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--b47q7-eth0" Jul 10 00:58:55.675548 env[1248]: time="2025-07-10T00:58:55.675501016Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:58:55.675639 env[1248]: time="2025-07-10T00:58:55.675533026Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:58:55.675694 env[1248]: time="2025-07-10T00:58:55.675629469Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:58:55.675839 env[1248]: time="2025-07-10T00:58:55.675817885Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e pid=3735 runtime=io.containerd.runc.v2 Jul 10 00:58:55.685702 systemd[1]: Started cri-containerd-d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e.scope. Jul 10 00:58:55.700481 kernel: kauditd_printk_skb: 650 callbacks suppressed Jul 10 00:58:55.700558 kernel: audit: type=1400 audit(1752109135.695:1125): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.711291 kernel: audit: type=1400 audit(1752109135.695:1126): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.711336 kernel: audit: type=1400 audit(1752109135.695:1127): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.711360 kernel: audit: type=1400 audit(1752109135.695:1128): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.711380 kernel: audit: type=1400 audit(1752109135.695:1129): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.708769 systemd-resolved[1203]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:58:55.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.717149 kernel: audit: type=1400 audit(1752109135.695:1130): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.717189 kernel: audit: type=1400 audit(1752109135.695:1131): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.719849 kernel: audit: type=1400 audit(1752109135.695:1132): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.722443 kernel: audit: type=1400 audit(1752109135.695:1133): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.724998 kernel: audit: type=1400 audit(1752109135.695:1134): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.695000 audit: BPF prog-id=165 op=LOAD Jul 10 00:58:55.695000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.695000 audit[3744]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3735 pid=3744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:55.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439363235613233303465373639303362303537363832336436346236 Jul 10 00:58:55.695000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.695000 audit[3744]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3735 pid=3744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:55.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439363235613233303465373639303362303537363832336436346236 Jul 10 00:58:55.695000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.695000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.695000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.695000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.695000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.695000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.695000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.695000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.695000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.695000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.695000 audit: BPF prog-id=166 op=LOAD Jul 10 00:58:55.695000 audit[3744]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00032dd10 items=0 ppid=3735 pid=3744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:55.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439363235613233303465373639303362303537363832336436346236 Jul 10 00:58:55.696000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.696000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.696000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.696000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.696000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.696000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.696000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.696000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.696000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.696000 audit: BPF prog-id=167 op=LOAD Jul 10 00:58:55.696000 audit[3744]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00032dd58 items=0 ppid=3735 pid=3744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:55.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439363235613233303465373639303362303537363832336436346236 Jul 10 00:58:55.699000 audit: BPF prog-id=167 op=UNLOAD Jul 10 00:58:55.699000 audit: BPF prog-id=166 op=UNLOAD Jul 10 00:58:55.699000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.699000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.699000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.699000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.699000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.699000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.699000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.699000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.699000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.699000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.699000 audit: BPF prog-id=168 op=LOAD Jul 10 00:58:55.699000 audit[3744]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003ac168 items=0 ppid=3735 pid=3744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:55.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439363235613233303465373639303362303537363832336436346236 Jul 10 00:58:55.741789 env[1248]: time="2025-07-10T00:58:55.741758945Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-b47q7,Uid:1d40f785-0a7b-4a11-9275-67e6b3486e34,Namespace:kube-system,Attempt:1,} returns sandbox id \"d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e\"" Jul 10 00:58:55.747620 env[1248]: time="2025-07-10T00:58:55.747592920Z" level=info msg="CreateContainer within sandbox \"d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 10 00:58:55.756612 systemd-networkd[1059]: cali3c456433cd0: Link UP Jul 10 00:58:55.757855 systemd-networkd[1059]: cali3c456433cd0: Gained carrier Jul 10 00:58:55.758353 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3c456433cd0: link becomes ready Jul 10 00:58:55.771207 env[1248]: 2025-07-10 00:58:55.609 [INFO][3688] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-eth0 calico-kube-controllers-65594c9c4c- calico-system 79c54820-9de2-4eff-9b0c-ba6143dd7d8d 949 0 2025-07-10 00:58:30 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:65594c9c4c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-65594c9c4c-wld2r eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali3c456433cd0 [] [] }} ContainerID="f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96" Namespace="calico-system" Pod="calico-kube-controllers-65594c9c4c-wld2r" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-" Jul 10 00:58:55.771207 env[1248]: 2025-07-10 00:58:55.609 [INFO][3688] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96" Namespace="calico-system" Pod="calico-kube-controllers-65594c9c4c-wld2r" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-eth0" Jul 10 00:58:55.771207 env[1248]: 2025-07-10 00:58:55.644 [INFO][3715] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96" HandleID="k8s-pod-network.f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96" Workload="localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-eth0" Jul 10 00:58:55.771207 env[1248]: 2025-07-10 00:58:55.645 [INFO][3715] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96" HandleID="k8s-pod-network.f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96" Workload="localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4ff0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-65594c9c4c-wld2r", "timestamp":"2025-07-10 00:58:55.644901591 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:58:55.771207 env[1248]: 2025-07-10 00:58:55.645 [INFO][3715] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:58:55.771207 env[1248]: 2025-07-10 00:58:55.648 [INFO][3715] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:58:55.771207 env[1248]: 2025-07-10 00:58:55.648 [INFO][3715] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Jul 10 00:58:55.771207 env[1248]: 2025-07-10 00:58:55.726 [INFO][3715] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96" host="localhost" Jul 10 00:58:55.771207 env[1248]: 2025-07-10 00:58:55.732 [INFO][3715] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Jul 10 00:58:55.771207 env[1248]: 2025-07-10 00:58:55.736 [INFO][3715] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Jul 10 00:58:55.771207 env[1248]: 2025-07-10 00:58:55.739 [INFO][3715] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Jul 10 00:58:55.771207 env[1248]: 2025-07-10 00:58:55.741 [INFO][3715] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Jul 10 00:58:55.771207 env[1248]: 2025-07-10 00:58:55.741 [INFO][3715] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96" host="localhost" Jul 10 00:58:55.771207 env[1248]: 2025-07-10 00:58:55.743 [INFO][3715] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96 Jul 10 00:58:55.771207 env[1248]: 2025-07-10 00:58:55.748 [INFO][3715] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96" host="localhost" Jul 10 00:58:55.771207 env[1248]: 2025-07-10 00:58:55.752 [INFO][3715] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96" host="localhost" Jul 10 00:58:55.771207 env[1248]: 2025-07-10 00:58:55.752 [INFO][3715] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96" host="localhost" Jul 10 00:58:55.771207 env[1248]: 2025-07-10 00:58:55.752 [INFO][3715] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:58:55.771207 env[1248]: 2025-07-10 00:58:55.752 [INFO][3715] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96" HandleID="k8s-pod-network.f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96" Workload="localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-eth0" Jul 10 00:58:55.771705 env[1248]: 2025-07-10 00:58:55.754 [INFO][3688] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96" Namespace="calico-system" Pod="calico-kube-controllers-65594c9c4c-wld2r" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-eth0", GenerateName:"calico-kube-controllers-65594c9c4c-", Namespace:"calico-system", SelfLink:"", UID:"79c54820-9de2-4eff-9b0c-ba6143dd7d8d", ResourceVersion:"949", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65594c9c4c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-65594c9c4c-wld2r", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3c456433cd0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:58:55.771705 env[1248]: 2025-07-10 00:58:55.754 [INFO][3688] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.131/32] ContainerID="f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96" Namespace="calico-system" Pod="calico-kube-controllers-65594c9c4c-wld2r" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-eth0" Jul 10 00:58:55.771705 env[1248]: 2025-07-10 00:58:55.754 [INFO][3688] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3c456433cd0 ContainerID="f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96" Namespace="calico-system" Pod="calico-kube-controllers-65594c9c4c-wld2r" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-eth0" Jul 10 00:58:55.771705 env[1248]: 2025-07-10 00:58:55.758 [INFO][3688] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96" Namespace="calico-system" Pod="calico-kube-controllers-65594c9c4c-wld2r" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-eth0" Jul 10 00:58:55.771705 env[1248]: 2025-07-10 00:58:55.759 [INFO][3688] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96" Namespace="calico-system" Pod="calico-kube-controllers-65594c9c4c-wld2r" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-eth0", GenerateName:"calico-kube-controllers-65594c9c4c-", Namespace:"calico-system", SelfLink:"", UID:"79c54820-9de2-4eff-9b0c-ba6143dd7d8d", ResourceVersion:"949", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65594c9c4c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96", Pod:"calico-kube-controllers-65594c9c4c-wld2r", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3c456433cd0", MAC:"06:f9:0e:8c:96:68", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:58:55.771705 env[1248]: 2025-07-10 00:58:55.769 [INFO][3688] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96" Namespace="calico-system" Pod="calico-kube-controllers-65594c9c4c-wld2r" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-eth0" Jul 10 00:58:55.792794 env[1248]: time="2025-07-10T00:58:55.785052829Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:58:55.792794 env[1248]: time="2025-07-10T00:58:55.785117433Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:58:55.792794 env[1248]: time="2025-07-10T00:58:55.785150967Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:58:55.792794 env[1248]: time="2025-07-10T00:58:55.785352829Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96 pid=3784 runtime=io.containerd.runc.v2 Jul 10 00:58:55.796603 systemd[1]: Started cri-containerd-f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96.scope. Jul 10 00:58:55.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.806000 audit: BPF prog-id=169 op=LOAD Jul 10 00:58:55.806000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.806000 audit[3794]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3784 pid=3794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:55.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636396131613362656262633339306635636166643737336163383336 Jul 10 00:58:55.806000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.806000 audit[3794]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3784 pid=3794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:55.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636396131613362656262633339306635636166643737336163383336 Jul 10 00:58:55.806000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.806000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.806000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.806000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.806000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.806000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.806000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.806000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.806000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.806000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.806000 audit: BPF prog-id=170 op=LOAD Jul 10 00:58:55.806000 audit[3794]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002231a0 items=0 ppid=3784 pid=3794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:55.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636396131613362656262633339306635636166643737336163383336 Jul 10 00:58:55.807000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.807000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.807000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.807000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.807000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.807000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.807000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.807000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.807000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.807000 audit: BPF prog-id=171 op=LOAD Jul 10 00:58:55.807000 audit[3794]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002231e8 items=0 ppid=3784 pid=3794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:55.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636396131613362656262633339306635636166643737336163383336 Jul 10 00:58:55.807000 audit: BPF prog-id=171 op=UNLOAD Jul 10 00:58:55.807000 audit: BPF prog-id=170 op=UNLOAD Jul 10 00:58:55.807000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.807000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.807000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.807000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.807000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.807000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.807000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.807000 audit[3794]: AVC avc: denied { perfmon } for pid=3794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.807000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.807000 audit[3794]: AVC avc: denied { bpf } for pid=3794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.807000 audit: BPF prog-id=172 op=LOAD Jul 10 00:58:55.807000 audit[3794]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002235f8 items=0 ppid=3784 pid=3794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:55.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636396131613362656262633339306635636166643737336163383336 Jul 10 00:58:55.810582 systemd-resolved[1203]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:58:55.811000 audit[3811]: NETFILTER_CFG table=filter:104 family=2 entries=42 op=nft_register_chain pid=3811 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:58:55.811000 audit[3811]: SYSCALL arch=c000003e syscall=46 success=yes exit=22552 a0=3 a1=7ffe813ebb70 a2=0 a3=7ffe813ebb5c items=0 ppid=3380 pid=3811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:55.811000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:58:55.818581 env[1248]: time="2025-07-10T00:58:55.818549413Z" level=info msg="CreateContainer within sandbox \"d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"bc720eedcdcf533d543c512e2d50a58b447b1389d3bf35cfc7692d29fff5782d\"" Jul 10 00:58:55.819147 env[1248]: time="2025-07-10T00:58:55.819126581Z" level=info msg="StartContainer for \"bc720eedcdcf533d543c512e2d50a58b447b1389d3bf35cfc7692d29fff5782d\"" Jul 10 00:58:55.829483 systemd[1]: Started cri-containerd-bc720eedcdcf533d543c512e2d50a58b447b1389d3bf35cfc7692d29fff5782d.scope. Jul 10 00:58:55.828000 audit[3828]: NETFILTER_CFG table=filter:105 family=2 entries=40 op=nft_register_chain pid=3828 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:58:55.828000 audit[3828]: SYSCALL arch=c000003e syscall=46 success=yes exit=20764 a0=3 a1=7ffee1d99f80 a2=0 a3=7ffee1d99f6c items=0 ppid=3380 pid=3828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:55.828000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:58:55.850940 env[1248]: time="2025-07-10T00:58:55.850901168Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65594c9c4c-wld2r,Uid:79c54820-9de2-4eff-9b0c-ba6143dd7d8d,Namespace:calico-system,Attempt:1,} returns sandbox id \"f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96\"" Jul 10 00:58:55.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.855000 audit: BPF prog-id=173 op=LOAD Jul 10 00:58:55.856000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.856000 audit[3823]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3735 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:55.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373230656564636463663533336435343363353132653264353061 Jul 10 00:58:55.856000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.856000 audit[3823]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3735 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:55.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373230656564636463663533336435343363353132653264353061 Jul 10 00:58:55.856000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.856000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.856000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.856000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.856000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.856000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.856000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.856000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.856000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.856000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.856000 audit: BPF prog-id=174 op=LOAD Jul 10 00:58:55.856000 audit[3823]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002aee20 items=0 ppid=3735 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:55.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373230656564636463663533336435343363353132653264353061 Jul 10 00:58:55.857000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.857000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.857000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.857000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.857000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.857000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.857000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.857000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.857000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.857000 audit: BPF prog-id=175 op=LOAD Jul 10 00:58:55.857000 audit[3823]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002aee68 items=0 ppid=3735 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:55.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373230656564636463663533336435343363353132653264353061 Jul 10 00:58:55.857000 audit: BPF prog-id=175 op=UNLOAD Jul 10 00:58:55.857000 audit: BPF prog-id=174 op=UNLOAD Jul 10 00:58:55.857000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.857000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.857000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.857000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.857000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.857000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.857000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.857000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.857000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.857000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:55.857000 audit: BPF prog-id=176 op=LOAD Jul 10 00:58:55.857000 audit[3823]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002af278 items=0 ppid=3735 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:55.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373230656564636463663533336435343363353132653264353061 Jul 10 00:58:55.883818 env[1248]: time="2025-07-10T00:58:55.883796650Z" level=info msg="StartContainer for \"bc720eedcdcf533d543c512e2d50a58b447b1389d3bf35cfc7692d29fff5782d\" returns successfully" Jul 10 00:58:56.024463 systemd-networkd[1059]: cali1386292c8f2: Gained IPv6LL Jul 10 00:58:56.140000 audit[3834]: AVC avc: denied { getattr } for pid=3834 comm="coredns" path="cgroup:[4026532890]" dev="nsfs" ino=4026532890 scontext=system_u:system_r:svirt_lxc_net_t:s0:c494,c961 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Jul 10 00:58:56.140000 audit[3834]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aa38 a2=c0000c4fa8 a3=0 items=0 ppid=3735 pid=3834 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c494,c961 key=(null) Jul 10 00:58:56.140000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Jul 10 00:58:56.739876 kubelet[2097]: I0710 00:58:56.734063 2097 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-b47q7" podStartSLOduration=38.732524644 podStartE2EDuration="38.732524644s" podCreationTimestamp="2025-07-10 00:58:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-07-10 00:58:56.724735896 +0000 UTC m=+44.474133557" watchObservedRunningTime="2025-07-10 00:58:56.732524644 +0000 UTC m=+44.481922299" Jul 10 00:58:56.795000 audit[3860]: NETFILTER_CFG table=filter:106 family=2 entries=17 op=nft_register_rule pid=3860 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:58:56.795000 audit[3860]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fffbb83f200 a2=0 a3=7fffbb83f1ec items=0 ppid=2201 pid=3860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:56.795000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:58:56.800000 audit[3860]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=3860 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:58:56.800000 audit[3860]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fffbb83f200 a2=0 a3=7fffbb83f1ec items=0 ppid=2201 pid=3860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:56.800000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:58:56.877000 audit[3862]: NETFILTER_CFG table=filter:108 family=2 entries=14 op=nft_register_rule pid=3862 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:58:56.877000 audit[3862]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff19d089d0 a2=0 a3=7fff19d089bc items=0 ppid=2201 pid=3862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:56.877000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:58:56.881566 env[1248]: time="2025-07-10T00:58:56.881545663Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:56.881000 audit[3862]: NETFILTER_CFG table=nat:109 family=2 entries=20 op=nft_register_rule pid=3862 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:58:56.881000 audit[3862]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff19d089d0 a2=0 a3=7fff19d089bc items=0 ppid=2201 pid=3862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:56.881000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:58:56.891090 env[1248]: time="2025-07-10T00:58:56.891070349Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eb8f512acf9402730da120a7b0d47d3d9d451b56e6e5eb8bad53ab24f926f954,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:56.893377 env[1248]: time="2025-07-10T00:58:56.893363901Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/whisker:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:56.898048 env[1248]: time="2025-07-10T00:58:56.898031712Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker@sha256:31346d4524252a3b0d2a1d289c4985b8402b498b5ce82a12e682096ab7446678,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:58:56.898394 env[1248]: time="2025-07-10T00:58:56.898377100Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.2\" returns image reference \"sha256:eb8f512acf9402730da120a7b0d47d3d9d451b56e6e5eb8bad53ab24f926f954\"" Jul 10 00:58:56.905449 env[1248]: time="2025-07-10T00:58:56.905432395Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.2\"" Jul 10 00:58:56.915311 env[1248]: time="2025-07-10T00:58:56.915291000Z" level=info msg="CreateContainer within sandbox \"11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3\" for container &ContainerMetadata{Name:whisker,Attempt:0,}" Jul 10 00:58:56.951419 env[1248]: time="2025-07-10T00:58:56.951384011Z" level=info msg="CreateContainer within sandbox \"11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3\" for &ContainerMetadata{Name:whisker,Attempt:0,} returns container id \"7e36bddf40f63dc3979ea1c952996c87ac3b8bdc1e952ea1d22e04d9862971d0\"" Jul 10 00:58:56.951887 env[1248]: time="2025-07-10T00:58:56.951852458Z" level=info msg="StartContainer for \"7e36bddf40f63dc3979ea1c952996c87ac3b8bdc1e952ea1d22e04d9862971d0\"" Jul 10 00:58:56.978294 systemd[1]: run-containerd-runc-k8s.io-7e36bddf40f63dc3979ea1c952996c87ac3b8bdc1e952ea1d22e04d9862971d0-runc.hynUwP.mount: Deactivated successfully. Jul 10 00:58:56.981554 systemd[1]: Started cri-containerd-7e36bddf40f63dc3979ea1c952996c87ac3b8bdc1e952ea1d22e04d9862971d0.scope. Jul 10 00:58:56.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.989000 audit: BPF prog-id=177 op=LOAD Jul 10 00:58:56.991000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.991000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3595 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:56.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765333662646466343066363364633339373965613163393532393936 Jul 10 00:58:56.991000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.991000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3595 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:56.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765333662646466343066363364633339373965613163393532393936 Jul 10 00:58:56.991000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.991000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.991000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.991000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.991000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.991000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.991000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.991000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.991000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.991000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.991000 audit: BPF prog-id=178 op=LOAD Jul 10 00:58:56.991000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0000243b0 items=0 ppid=3595 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:56.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765333662646466343066363364633339373965613163393532393936 Jul 10 00:58:56.992000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.992000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.992000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.992000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.992000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.992000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.992000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.992000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.992000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.992000 audit: BPF prog-id=179 op=LOAD Jul 10 00:58:56.992000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0000243f8 items=0 ppid=3595 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:56.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765333662646466343066363364633339373965613163393532393936 Jul 10 00:58:56.992000 audit: BPF prog-id=179 op=UNLOAD Jul 10 00:58:56.992000 audit: BPF prog-id=178 op=UNLOAD Jul 10 00:58:56.992000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.992000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.992000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.992000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.992000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.992000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.992000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.992000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.992000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.992000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:56.992000 audit: BPF prog-id=180 op=LOAD Jul 10 00:58:56.992000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000024808 items=0 ppid=3595 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:56.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765333662646466343066363364633339373965613163393532393936 Jul 10 00:58:57.016525 env[1248]: time="2025-07-10T00:58:57.016500676Z" level=info msg="StartContainer for \"7e36bddf40f63dc3979ea1c952996c87ac3b8bdc1e952ea1d22e04d9862971d0\" returns successfully" Jul 10 00:58:57.112442 systemd-networkd[1059]: cali773531f53f6: Gained IPv6LL Jul 10 00:58:57.125000 audit[3882]: AVC avc: denied { search } for pid=3882 comm="nginx" name="crypto" dev="proc" ino=37809 scontext=system_u:system_r:svirt_lxc_net_t:s0:c364,c890 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 10 00:58:57.125000 audit[3882]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fe6c1592728 a2=0 a3=0 items=0 ppid=3595 pid=3882 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="nginx" exe="/usr/sbin/nginx" subj=system_u:system_r:svirt_lxc_net_t:s0:c364,c890 key=(null) Jul 10 00:58:57.125000 audit: PROCTITLE proctitle=2F7573722F7362696E2F6E67696E78002D67006461656D6F6E206F66663B Jul 10 00:58:57.624473 systemd-networkd[1059]: cali3c456433cd0: Gained IPv6LL Jul 10 00:58:58.417884 env[1248]: time="2025-07-10T00:58:58.417691553Z" level=info msg="StopPodSandbox for \"ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e\"" Jul 10 00:58:58.420286 env[1248]: time="2025-07-10T00:58:58.420260720Z" level=info msg="StopPodSandbox for \"dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178\"" Jul 10 00:58:58.727982 env[1248]: 2025-07-10 00:58:58.631 [INFO][3924] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" Jul 10 00:58:58.727982 env[1248]: 2025-07-10 00:58:58.631 [INFO][3924] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" iface="eth0" netns="/var/run/netns/cni-e102c41d-10a1-5075-762d-6a4ffad11eb6" Jul 10 00:58:58.727982 env[1248]: 2025-07-10 00:58:58.631 [INFO][3924] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" iface="eth0" netns="/var/run/netns/cni-e102c41d-10a1-5075-762d-6a4ffad11eb6" Jul 10 00:58:58.727982 env[1248]: 2025-07-10 00:58:58.633 [INFO][3924] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" iface="eth0" netns="/var/run/netns/cni-e102c41d-10a1-5075-762d-6a4ffad11eb6" Jul 10 00:58:58.727982 env[1248]: 2025-07-10 00:58:58.634 [INFO][3924] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" Jul 10 00:58:58.727982 env[1248]: 2025-07-10 00:58:58.634 [INFO][3924] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" Jul 10 00:58:58.727982 env[1248]: 2025-07-10 00:58:58.713 [INFO][3936] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" HandleID="k8s-pod-network.dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" Workload="localhost-k8s-calico--apiserver--8555b5848b--wn4zc-eth0" Jul 10 00:58:58.727982 env[1248]: 2025-07-10 00:58:58.713 [INFO][3936] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:58:58.727982 env[1248]: 2025-07-10 00:58:58.713 [INFO][3936] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:58:58.727982 env[1248]: 2025-07-10 00:58:58.723 [WARNING][3936] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" HandleID="k8s-pod-network.dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" Workload="localhost-k8s-calico--apiserver--8555b5848b--wn4zc-eth0" Jul 10 00:58:58.727982 env[1248]: 2025-07-10 00:58:58.723 [INFO][3936] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" HandleID="k8s-pod-network.dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" Workload="localhost-k8s-calico--apiserver--8555b5848b--wn4zc-eth0" Jul 10 00:58:58.727982 env[1248]: 2025-07-10 00:58:58.723 [INFO][3936] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:58:58.727982 env[1248]: 2025-07-10 00:58:58.725 [INFO][3924] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" Jul 10 00:58:58.731491 env[1248]: time="2025-07-10T00:58:58.730714266Z" level=info msg="TearDown network for sandbox \"dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178\" successfully" Jul 10 00:58:58.731491 env[1248]: time="2025-07-10T00:58:58.730737600Z" level=info msg="StopPodSandbox for \"dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178\" returns successfully" Jul 10 00:58:58.730105 systemd[1]: run-netns-cni\x2de102c41d\x2d10a1\x2d5075\x2d762d\x2d6a4ffad11eb6.mount: Deactivated successfully. Jul 10 00:58:58.734811 env[1248]: time="2025-07-10T00:58:58.734794242Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8555b5848b-wn4zc,Uid:2344db36-50ac-4694-a93c-64e61cbf023f,Namespace:calico-apiserver,Attempt:1,}" Jul 10 00:58:58.757368 env[1248]: 2025-07-10 00:58:58.647 [INFO][3923] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" Jul 10 00:58:58.757368 env[1248]: 2025-07-10 00:58:58.653 [INFO][3923] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" iface="eth0" netns="/var/run/netns/cni-5c97cdf8-dac9-4302-ae0e-f629704b47b9" Jul 10 00:58:58.757368 env[1248]: 2025-07-10 00:58:58.654 [INFO][3923] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" iface="eth0" netns="/var/run/netns/cni-5c97cdf8-dac9-4302-ae0e-f629704b47b9" Jul 10 00:58:58.757368 env[1248]: 2025-07-10 00:58:58.654 [INFO][3923] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" iface="eth0" netns="/var/run/netns/cni-5c97cdf8-dac9-4302-ae0e-f629704b47b9" Jul 10 00:58:58.757368 env[1248]: 2025-07-10 00:58:58.654 [INFO][3923] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" Jul 10 00:58:58.757368 env[1248]: 2025-07-10 00:58:58.654 [INFO][3923] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" Jul 10 00:58:58.757368 env[1248]: 2025-07-10 00:58:58.724 [INFO][3938] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" HandleID="k8s-pod-network.ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" Workload="localhost-k8s-csi--node--driver--4vdxb-eth0" Jul 10 00:58:58.757368 env[1248]: 2025-07-10 00:58:58.724 [INFO][3938] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:58:58.757368 env[1248]: 2025-07-10 00:58:58.724 [INFO][3938] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:58:58.757368 env[1248]: 2025-07-10 00:58:58.749 [WARNING][3938] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" HandleID="k8s-pod-network.ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" Workload="localhost-k8s-csi--node--driver--4vdxb-eth0" Jul 10 00:58:58.757368 env[1248]: 2025-07-10 00:58:58.749 [INFO][3938] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" HandleID="k8s-pod-network.ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" Workload="localhost-k8s-csi--node--driver--4vdxb-eth0" Jul 10 00:58:58.757368 env[1248]: 2025-07-10 00:58:58.753 [INFO][3938] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:58:58.757368 env[1248]: 2025-07-10 00:58:58.755 [INFO][3923] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" Jul 10 00:58:58.761607 env[1248]: time="2025-07-10T00:58:58.759525622Z" level=info msg="TearDown network for sandbox \"ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e\" successfully" Jul 10 00:58:58.761607 env[1248]: time="2025-07-10T00:58:58.759554879Z" level=info msg="StopPodSandbox for \"ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e\" returns successfully" Jul 10 00:58:58.759144 systemd[1]: run-netns-cni\x2d5c97cdf8\x2ddac9\x2d4302\x2dae0e\x2df629704b47b9.mount: Deactivated successfully. Jul 10 00:58:58.763879 env[1248]: time="2025-07-10T00:58:58.763853060Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-4vdxb,Uid:100cec77-b0fb-436f-a956-a4a5a994a411,Namespace:calico-system,Attempt:1,}" Jul 10 00:58:58.912226 systemd-networkd[1059]: calibf75d8591a4: Link UP Jul 10 00:58:58.922022 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 10 00:58:58.923370 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibf75d8591a4: link becomes ready Jul 10 00:58:58.928516 systemd-networkd[1059]: calibf75d8591a4: Gained carrier Jul 10 00:58:58.938851 env[1248]: 2025-07-10 00:58:58.796 [INFO][3950] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--8555b5848b--wn4zc-eth0 calico-apiserver-8555b5848b- calico-apiserver 2344db36-50ac-4694-a93c-64e61cbf023f 978 0 2025-07-10 00:58:27 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:8555b5848b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-8555b5848b-wn4zc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calibf75d8591a4 [] [] }} ContainerID="22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1" Namespace="calico-apiserver" Pod="calico-apiserver-8555b5848b-wn4zc" WorkloadEndpoint="localhost-k8s-calico--apiserver--8555b5848b--wn4zc-" Jul 10 00:58:58.938851 env[1248]: 2025-07-10 00:58:58.796 [INFO][3950] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1" Namespace="calico-apiserver" Pod="calico-apiserver-8555b5848b-wn4zc" WorkloadEndpoint="localhost-k8s-calico--apiserver--8555b5848b--wn4zc-eth0" Jul 10 00:58:58.938851 env[1248]: 2025-07-10 00:58:58.851 [INFO][3974] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1" HandleID="k8s-pod-network.22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1" Workload="localhost-k8s-calico--apiserver--8555b5848b--wn4zc-eth0" Jul 10 00:58:58.938851 env[1248]: 2025-07-10 00:58:58.851 [INFO][3974] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1" HandleID="k8s-pod-network.22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1" Workload="localhost-k8s-calico--apiserver--8555b5848b--wn4zc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00025b0a0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-8555b5848b-wn4zc", "timestamp":"2025-07-10 00:58:58.851771816 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:58:58.938851 env[1248]: 2025-07-10 00:58:58.852 [INFO][3974] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:58:58.938851 env[1248]: 2025-07-10 00:58:58.852 [INFO][3974] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:58:58.938851 env[1248]: 2025-07-10 00:58:58.852 [INFO][3974] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Jul 10 00:58:58.938851 env[1248]: 2025-07-10 00:58:58.856 [INFO][3974] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1" host="localhost" Jul 10 00:58:58.938851 env[1248]: 2025-07-10 00:58:58.858 [INFO][3974] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Jul 10 00:58:58.938851 env[1248]: 2025-07-10 00:58:58.861 [INFO][3974] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Jul 10 00:58:58.938851 env[1248]: 2025-07-10 00:58:58.862 [INFO][3974] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Jul 10 00:58:58.938851 env[1248]: 2025-07-10 00:58:58.863 [INFO][3974] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Jul 10 00:58:58.938851 env[1248]: 2025-07-10 00:58:58.863 [INFO][3974] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1" host="localhost" Jul 10 00:58:58.938851 env[1248]: 2025-07-10 00:58:58.868 [INFO][3974] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1 Jul 10 00:58:58.938851 env[1248]: 2025-07-10 00:58:58.882 [INFO][3974] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1" host="localhost" Jul 10 00:58:58.938851 env[1248]: 2025-07-10 00:58:58.895 [INFO][3974] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1" host="localhost" Jul 10 00:58:58.938851 env[1248]: 2025-07-10 00:58:58.895 [INFO][3974] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1" host="localhost" Jul 10 00:58:58.938851 env[1248]: 2025-07-10 00:58:58.895 [INFO][3974] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:58:58.938851 env[1248]: 2025-07-10 00:58:58.895 [INFO][3974] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1" HandleID="k8s-pod-network.22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1" Workload="localhost-k8s-calico--apiserver--8555b5848b--wn4zc-eth0" Jul 10 00:58:58.968067 env[1248]: 2025-07-10 00:58:58.896 [INFO][3950] cni-plugin/k8s.go 418: Populated endpoint ContainerID="22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1" Namespace="calico-apiserver" Pod="calico-apiserver-8555b5848b-wn4zc" WorkloadEndpoint="localhost-k8s-calico--apiserver--8555b5848b--wn4zc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--8555b5848b--wn4zc-eth0", GenerateName:"calico-apiserver-8555b5848b-", Namespace:"calico-apiserver", SelfLink:"", UID:"2344db36-50ac-4694-a93c-64e61cbf023f", ResourceVersion:"978", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8555b5848b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-8555b5848b-wn4zc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibf75d8591a4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:58:58.968067 env[1248]: 2025-07-10 00:58:58.896 [INFO][3950] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.132/32] ContainerID="22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1" Namespace="calico-apiserver" Pod="calico-apiserver-8555b5848b-wn4zc" WorkloadEndpoint="localhost-k8s-calico--apiserver--8555b5848b--wn4zc-eth0" Jul 10 00:58:58.968067 env[1248]: 2025-07-10 00:58:58.896 [INFO][3950] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calibf75d8591a4 ContainerID="22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1" Namespace="calico-apiserver" Pod="calico-apiserver-8555b5848b-wn4zc" WorkloadEndpoint="localhost-k8s-calico--apiserver--8555b5848b--wn4zc-eth0" Jul 10 00:58:58.968067 env[1248]: 2025-07-10 00:58:58.923 [INFO][3950] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1" Namespace="calico-apiserver" Pod="calico-apiserver-8555b5848b-wn4zc" WorkloadEndpoint="localhost-k8s-calico--apiserver--8555b5848b--wn4zc-eth0" Jul 10 00:58:58.968067 env[1248]: 2025-07-10 00:58:58.923 [INFO][3950] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1" Namespace="calico-apiserver" Pod="calico-apiserver-8555b5848b-wn4zc" WorkloadEndpoint="localhost-k8s-calico--apiserver--8555b5848b--wn4zc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--8555b5848b--wn4zc-eth0", GenerateName:"calico-apiserver-8555b5848b-", Namespace:"calico-apiserver", SelfLink:"", UID:"2344db36-50ac-4694-a93c-64e61cbf023f", ResourceVersion:"978", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8555b5848b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1", Pod:"calico-apiserver-8555b5848b-wn4zc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibf75d8591a4", MAC:"32:de:7d:6a:3e:2d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:58:58.968067 env[1248]: 2025-07-10 00:58:58.937 [INFO][3950] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1" Namespace="calico-apiserver" Pod="calico-apiserver-8555b5848b-wn4zc" WorkloadEndpoint="localhost-k8s-calico--apiserver--8555b5848b--wn4zc-eth0" Jul 10 00:58:58.980000 audit[3997]: NETFILTER_CFG table=filter:110 family=2 entries=58 op=nft_register_chain pid=3997 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:58:58.980000 audit[3997]: SYSCALL arch=c000003e syscall=46 success=yes exit=30584 a0=3 a1=7ffffb0127f0 a2=0 a3=7ffffb0127dc items=0 ppid=3380 pid=3997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:58.980000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:58:58.991065 env[1248]: time="2025-07-10T00:58:58.984444143Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:58:58.991065 env[1248]: time="2025-07-10T00:58:58.984765730Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:58:58.991065 env[1248]: time="2025-07-10T00:58:58.984789520Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:58:58.991065 env[1248]: time="2025-07-10T00:58:58.985101464Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1 pid=4006 runtime=io.containerd.runc.v2 Jul 10 00:58:59.001281 systemd[1]: Started cri-containerd-22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1.scope. Jul 10 00:58:59.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.013000 audit: BPF prog-id=181 op=LOAD Jul 10 00:58:59.013000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.013000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4006 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:59.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232313538656137613664643032326564363562303130333332376333 Jul 10 00:58:59.014000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.014000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4006 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:59.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232313538656137613664643032326564363562303130333332376333 Jul 10 00:58:59.014000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.014000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.014000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.014000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.014000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.014000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.014000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.014000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.014000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.014000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.014000 audit: BPF prog-id=182 op=LOAD Jul 10 00:58:59.014000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000025740 items=0 ppid=4006 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:59.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232313538656137613664643032326564363562303130333332376333 Jul 10 00:58:59.015000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.015000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.015000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.015000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.015000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.015000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.015000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.015000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.015000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.015000 audit: BPF prog-id=183 op=LOAD Jul 10 00:58:59.030990 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali97467c81b48: link becomes ready Jul 10 00:58:59.015000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000025788 items=0 ppid=4006 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:59.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232313538656137613664643032326564363562303130333332376333 Jul 10 00:58:59.015000 audit: BPF prog-id=183 op=UNLOAD Jul 10 00:58:59.015000 audit: BPF prog-id=182 op=UNLOAD Jul 10 00:58:59.015000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.015000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.015000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.015000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.015000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.015000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.015000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.015000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.015000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.015000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.015000 audit: BPF prog-id=184 op=LOAD Jul 10 00:58:59.015000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000025b98 items=0 ppid=4006 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:59.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232313538656137613664643032326564363562303130333332376333 Jul 10 00:58:59.023380 systemd-resolved[1203]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:58:59.023950 systemd-networkd[1059]: cali97467c81b48: Link UP Jul 10 00:58:59.025492 systemd-networkd[1059]: cali97467c81b48: Gained carrier Jul 10 00:58:59.048344 env[1248]: 2025-07-10 00:58:58.809 [INFO][3960] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--4vdxb-eth0 csi-node-driver- calico-system 100cec77-b0fb-436f-a956-a4a5a994a411 979 0 2025-07-10 00:58:29 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:8967bcb6f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-4vdxb eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali97467c81b48 [] [] }} ContainerID="9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1" Namespace="calico-system" Pod="csi-node-driver-4vdxb" WorkloadEndpoint="localhost-k8s-csi--node--driver--4vdxb-" Jul 10 00:58:59.048344 env[1248]: 2025-07-10 00:58:58.809 [INFO][3960] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1" Namespace="calico-system" Pod="csi-node-driver-4vdxb" WorkloadEndpoint="localhost-k8s-csi--node--driver--4vdxb-eth0" Jul 10 00:58:59.048344 env[1248]: 2025-07-10 00:58:58.892 [INFO][3981] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1" HandleID="k8s-pod-network.9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1" Workload="localhost-k8s-csi--node--driver--4vdxb-eth0" Jul 10 00:58:59.048344 env[1248]: 2025-07-10 00:58:58.892 [INFO][3981] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1" HandleID="k8s-pod-network.9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1" Workload="localhost-k8s-csi--node--driver--4vdxb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00025b610), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-4vdxb", "timestamp":"2025-07-10 00:58:58.892261767 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:58:59.048344 env[1248]: 2025-07-10 00:58:58.892 [INFO][3981] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:58:59.048344 env[1248]: 2025-07-10 00:58:58.905 [INFO][3981] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:58:59.048344 env[1248]: 2025-07-10 00:58:58.907 [INFO][3981] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Jul 10 00:58:59.048344 env[1248]: 2025-07-10 00:58:58.956 [INFO][3981] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1" host="localhost" Jul 10 00:58:59.048344 env[1248]: 2025-07-10 00:58:58.967 [INFO][3981] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Jul 10 00:58:59.048344 env[1248]: 2025-07-10 00:58:58.971 [INFO][3981] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Jul 10 00:58:59.048344 env[1248]: 2025-07-10 00:58:58.972 [INFO][3981] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Jul 10 00:58:59.048344 env[1248]: 2025-07-10 00:58:58.974 [INFO][3981] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Jul 10 00:58:59.048344 env[1248]: 2025-07-10 00:58:58.974 [INFO][3981] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1" host="localhost" Jul 10 00:58:59.048344 env[1248]: 2025-07-10 00:58:58.975 [INFO][3981] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1 Jul 10 00:58:59.048344 env[1248]: 2025-07-10 00:58:58.986 [INFO][3981] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1" host="localhost" Jul 10 00:58:59.048344 env[1248]: 2025-07-10 00:58:59.018 [INFO][3981] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1" host="localhost" Jul 10 00:58:59.048344 env[1248]: 2025-07-10 00:58:59.018 [INFO][3981] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1" host="localhost" Jul 10 00:58:59.048344 env[1248]: 2025-07-10 00:58:59.018 [INFO][3981] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:58:59.048344 env[1248]: 2025-07-10 00:58:59.018 [INFO][3981] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1" HandleID="k8s-pod-network.9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1" Workload="localhost-k8s-csi--node--driver--4vdxb-eth0" Jul 10 00:58:59.052381 env[1248]: 2025-07-10 00:58:59.021 [INFO][3960] cni-plugin/k8s.go 418: Populated endpoint ContainerID="9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1" Namespace="calico-system" Pod="csi-node-driver-4vdxb" WorkloadEndpoint="localhost-k8s-csi--node--driver--4vdxb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--4vdxb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"100cec77-b0fb-436f-a956-a4a5a994a411", ResourceVersion:"979", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-4vdxb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali97467c81b48", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:58:59.052381 env[1248]: 2025-07-10 00:58:59.021 [INFO][3960] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.133/32] ContainerID="9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1" Namespace="calico-system" Pod="csi-node-driver-4vdxb" WorkloadEndpoint="localhost-k8s-csi--node--driver--4vdxb-eth0" Jul 10 00:58:59.052381 env[1248]: 2025-07-10 00:58:59.021 [INFO][3960] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali97467c81b48 ContainerID="9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1" Namespace="calico-system" Pod="csi-node-driver-4vdxb" WorkloadEndpoint="localhost-k8s-csi--node--driver--4vdxb-eth0" Jul 10 00:58:59.052381 env[1248]: 2025-07-10 00:58:59.025 [INFO][3960] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1" Namespace="calico-system" Pod="csi-node-driver-4vdxb" WorkloadEndpoint="localhost-k8s-csi--node--driver--4vdxb-eth0" Jul 10 00:58:59.052381 env[1248]: 2025-07-10 00:58:59.026 [INFO][3960] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1" Namespace="calico-system" Pod="csi-node-driver-4vdxb" WorkloadEndpoint="localhost-k8s-csi--node--driver--4vdxb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--4vdxb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"100cec77-b0fb-436f-a956-a4a5a994a411", ResourceVersion:"979", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1", Pod:"csi-node-driver-4vdxb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali97467c81b48", MAC:"e6:89:d4:88:03:4d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:58:59.052381 env[1248]: 2025-07-10 00:58:59.046 [INFO][3960] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1" Namespace="calico-system" Pod="csi-node-driver-4vdxb" WorkloadEndpoint="localhost-k8s-csi--node--driver--4vdxb-eth0" Jul 10 00:58:59.057883 env[1248]: time="2025-07-10T00:58:59.057756817Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8555b5848b-wn4zc,Uid:2344db36-50ac-4694-a93c-64e61cbf023f,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1\"" Jul 10 00:58:59.067000 audit[4054]: NETFILTER_CFG table=filter:111 family=2 entries=48 op=nft_register_chain pid=4054 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:58:59.067000 audit[4054]: SYSCALL arch=c000003e syscall=46 success=yes exit=23140 a0=3 a1=7ffd76c7db10 a2=0 a3=7ffd76c7dafc items=0 ppid=3380 pid=4054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:59.067000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:58:59.075946 env[1248]: time="2025-07-10T00:58:59.075896939Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:58:59.077114 env[1248]: time="2025-07-10T00:58:59.075951187Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:58:59.077114 env[1248]: time="2025-07-10T00:58:59.075967510Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:58:59.077114 env[1248]: time="2025-07-10T00:58:59.076099640Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1 pid=4061 runtime=io.containerd.runc.v2 Jul 10 00:58:59.084401 systemd[1]: Started cri-containerd-9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1.scope. Jul 10 00:58:59.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.102000 audit: BPF prog-id=185 op=LOAD Jul 10 00:58:59.102000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.102000 audit[4073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=4061 pid=4073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:59.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966653563393935613436333164303066633461323133626334636334 Jul 10 00:58:59.102000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.102000 audit[4073]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=4061 pid=4073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:59.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966653563393935613436333164303066633461323133626334636334 Jul 10 00:58:59.102000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.102000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.102000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.102000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.102000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.102000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.102000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.102000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.102000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.102000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.102000 audit: BPF prog-id=186 op=LOAD Jul 10 00:58:59.102000 audit[4073]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0003c29d0 items=0 ppid=4061 pid=4073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:59.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966653563393935613436333164303066633461323133626334636334 Jul 10 00:58:59.103000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.103000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.103000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.103000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.103000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.103000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.103000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.103000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.103000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.103000 audit: BPF prog-id=187 op=LOAD Jul 10 00:58:59.103000 audit[4073]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0003c2a18 items=0 ppid=4061 pid=4073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:59.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966653563393935613436333164303066633461323133626334636334 Jul 10 00:58:59.103000 audit: BPF prog-id=187 op=UNLOAD Jul 10 00:58:59.103000 audit: BPF prog-id=186 op=UNLOAD Jul 10 00:58:59.103000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.103000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.103000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.103000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.103000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.103000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.103000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.103000 audit[4073]: AVC avc: denied { perfmon } for pid=4073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.103000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.103000 audit[4073]: AVC avc: denied { bpf } for pid=4073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:58:59.103000 audit: BPF prog-id=188 op=LOAD Jul 10 00:58:59.103000 audit[4073]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003c2e28 items=0 ppid=4061 pid=4073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:59.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966653563393935613436333164303066633461323133626334636334 Jul 10 00:58:59.107651 systemd-resolved[1203]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:58:59.124322 env[1248]: time="2025-07-10T00:58:59.123930488Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-4vdxb,Uid:100cec77-b0fb-436f-a956-a4a5a994a411,Namespace:calico-system,Attempt:1,} returns sandbox id \"9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1\"" Jul 10 00:58:59.417490 env[1248]: time="2025-07-10T00:58:59.417378277Z" level=info msg="StopPodSandbox for \"b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da\"" Jul 10 00:58:59.433084 env[1248]: time="2025-07-10T00:58:59.432057193Z" level=info msg="StopPodSandbox for \"1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901\"" Jul 10 00:58:59.433084 env[1248]: time="2025-07-10T00:58:59.432549791Z" level=info msg="StopPodSandbox for \"1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2\"" Jul 10 00:58:59.436450 env[1248]: time="2025-07-10T00:58:59.436419711Z" level=info msg="StopPodSandbox for \"74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051\"" Jul 10 00:58:59.591765 env[1248]: 2025-07-10 00:58:59.547 [INFO][4139] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" Jul 10 00:58:59.591765 env[1248]: 2025-07-10 00:58:59.548 [INFO][4139] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" iface="eth0" netns="/var/run/netns/cni-4710eae4-8729-1e70-8374-848b5272e8fc" Jul 10 00:58:59.591765 env[1248]: 2025-07-10 00:58:59.548 [INFO][4139] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" iface="eth0" netns="/var/run/netns/cni-4710eae4-8729-1e70-8374-848b5272e8fc" Jul 10 00:58:59.591765 env[1248]: 2025-07-10 00:58:59.549 [INFO][4139] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" iface="eth0" netns="/var/run/netns/cni-4710eae4-8729-1e70-8374-848b5272e8fc" Jul 10 00:58:59.591765 env[1248]: 2025-07-10 00:58:59.549 [INFO][4139] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" Jul 10 00:58:59.591765 env[1248]: 2025-07-10 00:58:59.549 [INFO][4139] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" Jul 10 00:58:59.591765 env[1248]: 2025-07-10 00:58:59.577 [INFO][4163] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" HandleID="k8s-pod-network.1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0" Jul 10 00:58:59.591765 env[1248]: 2025-07-10 00:58:59.577 [INFO][4163] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:58:59.591765 env[1248]: 2025-07-10 00:58:59.577 [INFO][4163] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:58:59.591765 env[1248]: 2025-07-10 00:58:59.587 [WARNING][4163] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" HandleID="k8s-pod-network.1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0" Jul 10 00:58:59.591765 env[1248]: 2025-07-10 00:58:59.587 [INFO][4163] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" HandleID="k8s-pod-network.1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0" Jul 10 00:58:59.591765 env[1248]: 2025-07-10 00:58:59.588 [INFO][4163] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:58:59.591765 env[1248]: 2025-07-10 00:58:59.590 [INFO][4139] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" Jul 10 00:58:59.599844 env[1248]: time="2025-07-10T00:58:59.591892861Z" level=info msg="TearDown network for sandbox \"1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901\" successfully" Jul 10 00:58:59.599844 env[1248]: time="2025-07-10T00:58:59.591914239Z" level=info msg="StopPodSandbox for \"1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901\" returns successfully" Jul 10 00:58:59.614396 env[1248]: 2025-07-10 00:58:59.559 [INFO][4135] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" Jul 10 00:58:59.614396 env[1248]: 2025-07-10 00:58:59.560 [INFO][4135] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" iface="eth0" netns="/var/run/netns/cni-48012421-f3bd-35c6-fef0-f9b4d3ed94d6" Jul 10 00:58:59.614396 env[1248]: 2025-07-10 00:58:59.560 [INFO][4135] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" iface="eth0" netns="/var/run/netns/cni-48012421-f3bd-35c6-fef0-f9b4d3ed94d6" Jul 10 00:58:59.614396 env[1248]: 2025-07-10 00:58:59.560 [INFO][4135] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" iface="eth0" netns="/var/run/netns/cni-48012421-f3bd-35c6-fef0-f9b4d3ed94d6" Jul 10 00:58:59.614396 env[1248]: 2025-07-10 00:58:59.560 [INFO][4135] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" Jul 10 00:58:59.614396 env[1248]: 2025-07-10 00:58:59.560 [INFO][4135] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" Jul 10 00:58:59.614396 env[1248]: 2025-07-10 00:58:59.598 [INFO][4169] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" HandleID="k8s-pod-network.b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" Workload="localhost-k8s-coredns--668d6bf9bc--d6d57-eth0" Jul 10 00:58:59.614396 env[1248]: 2025-07-10 00:58:59.598 [INFO][4169] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:58:59.614396 env[1248]: 2025-07-10 00:58:59.598 [INFO][4169] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:58:59.614396 env[1248]: 2025-07-10 00:58:59.609 [WARNING][4169] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" HandleID="k8s-pod-network.b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" Workload="localhost-k8s-coredns--668d6bf9bc--d6d57-eth0" Jul 10 00:58:59.614396 env[1248]: 2025-07-10 00:58:59.609 [INFO][4169] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" HandleID="k8s-pod-network.b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" Workload="localhost-k8s-coredns--668d6bf9bc--d6d57-eth0" Jul 10 00:58:59.614396 env[1248]: 2025-07-10 00:58:59.610 [INFO][4169] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:58:59.614396 env[1248]: 2025-07-10 00:58:59.611 [INFO][4135] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" Jul 10 00:58:59.618393 env[1248]: time="2025-07-10T00:58:59.614518358Z" level=info msg="TearDown network for sandbox \"b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da\" successfully" Jul 10 00:58:59.618393 env[1248]: time="2025-07-10T00:58:59.614537967Z" level=info msg="StopPodSandbox for \"b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da\" returns successfully" Jul 10 00:58:59.642238 env[1248]: time="2025-07-10T00:58:59.642186858Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6765fdc8c8-5kgrr,Uid:929acd7b-6935-4495-be2b-b8264653f84a,Namespace:calico-apiserver,Attempt:1,}" Jul 10 00:58:59.647240 env[1248]: time="2025-07-10T00:58:59.647179776Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-d6d57,Uid:1b07da51-61a4-4653-83cd-4b8b69b6c8c0,Namespace:kube-system,Attempt:1,}" Jul 10 00:58:59.652363 env[1248]: 2025-07-10 00:58:59.566 [INFO][4143] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" Jul 10 00:58:59.652363 env[1248]: 2025-07-10 00:58:59.566 [INFO][4143] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" iface="eth0" netns="/var/run/netns/cni-af9d93d1-3e11-dd90-1c82-656279ba2244" Jul 10 00:58:59.652363 env[1248]: 2025-07-10 00:58:59.566 [INFO][4143] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" iface="eth0" netns="/var/run/netns/cni-af9d93d1-3e11-dd90-1c82-656279ba2244" Jul 10 00:58:59.652363 env[1248]: 2025-07-10 00:58:59.566 [INFO][4143] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" iface="eth0" netns="/var/run/netns/cni-af9d93d1-3e11-dd90-1c82-656279ba2244" Jul 10 00:58:59.652363 env[1248]: 2025-07-10 00:58:59.566 [INFO][4143] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" Jul 10 00:58:59.652363 env[1248]: 2025-07-10 00:58:59.566 [INFO][4143] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" Jul 10 00:58:59.652363 env[1248]: 2025-07-10 00:58:59.623 [INFO][4171] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" HandleID="k8s-pod-network.74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" Workload="localhost-k8s-goldmane--768f4c5c69--6bh96-eth0" Jul 10 00:58:59.652363 env[1248]: 2025-07-10 00:58:59.623 [INFO][4171] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:58:59.652363 env[1248]: 2025-07-10 00:58:59.623 [INFO][4171] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:58:59.652363 env[1248]: 2025-07-10 00:58:59.631 [WARNING][4171] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" HandleID="k8s-pod-network.74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" Workload="localhost-k8s-goldmane--768f4c5c69--6bh96-eth0" Jul 10 00:58:59.652363 env[1248]: 2025-07-10 00:58:59.631 [INFO][4171] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" HandleID="k8s-pod-network.74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" Workload="localhost-k8s-goldmane--768f4c5c69--6bh96-eth0" Jul 10 00:58:59.652363 env[1248]: 2025-07-10 00:58:59.636 [INFO][4171] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:58:59.652363 env[1248]: 2025-07-10 00:58:59.643 [INFO][4143] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" Jul 10 00:58:59.652363 env[1248]: time="2025-07-10T00:58:59.648965714Z" level=info msg="TearDown network for sandbox \"74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051\" successfully" Jul 10 00:58:59.652363 env[1248]: time="2025-07-10T00:58:59.648982974Z" level=info msg="StopPodSandbox for \"74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051\" returns successfully" Jul 10 00:58:59.652363 env[1248]: time="2025-07-10T00:58:59.649468858Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-768f4c5c69-6bh96,Uid:dfc77fd4-c756-489e-a5e3-3692e4542650,Namespace:calico-system,Attempt:1,}" Jul 10 00:58:59.717566 env[1248]: 2025-07-10 00:58:59.588 [INFO][4147] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" Jul 10 00:58:59.717566 env[1248]: 2025-07-10 00:58:59.588 [INFO][4147] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" iface="eth0" netns="/var/run/netns/cni-6c508521-0e84-ea10-5f03-97b8a6536dcf" Jul 10 00:58:59.717566 env[1248]: 2025-07-10 00:58:59.588 [INFO][4147] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" iface="eth0" netns="/var/run/netns/cni-6c508521-0e84-ea10-5f03-97b8a6536dcf" Jul 10 00:58:59.717566 env[1248]: 2025-07-10 00:58:59.589 [INFO][4147] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" iface="eth0" netns="/var/run/netns/cni-6c508521-0e84-ea10-5f03-97b8a6536dcf" Jul 10 00:58:59.717566 env[1248]: 2025-07-10 00:58:59.589 [INFO][4147] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" Jul 10 00:58:59.717566 env[1248]: 2025-07-10 00:58:59.589 [INFO][4147] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" Jul 10 00:58:59.717566 env[1248]: 2025-07-10 00:58:59.667 [INFO][4182] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" HandleID="k8s-pod-network.1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0" Jul 10 00:58:59.717566 env[1248]: 2025-07-10 00:58:59.668 [INFO][4182] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:58:59.717566 env[1248]: 2025-07-10 00:58:59.668 [INFO][4182] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:58:59.717566 env[1248]: 2025-07-10 00:58:59.712 [WARNING][4182] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" HandleID="k8s-pod-network.1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0" Jul 10 00:58:59.717566 env[1248]: 2025-07-10 00:58:59.712 [INFO][4182] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" HandleID="k8s-pod-network.1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0" Jul 10 00:58:59.717566 env[1248]: 2025-07-10 00:58:59.713 [INFO][4182] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:58:59.717566 env[1248]: 2025-07-10 00:58:59.714 [INFO][4147] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" Jul 10 00:58:59.733492 env[1248]: time="2025-07-10T00:58:59.717797646Z" level=info msg="TearDown network for sandbox \"1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2\" successfully" Jul 10 00:58:59.733492 env[1248]: time="2025-07-10T00:58:59.717816439Z" level=info msg="StopPodSandbox for \"1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2\" returns successfully" Jul 10 00:58:59.733492 env[1248]: time="2025-07-10T00:58:59.718164102Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6765fdc8c8-2wnxd,Uid:e40791bb-1dd3-4f13-a751-d75795ef4c90,Namespace:calico-apiserver,Attempt:1,}" Jul 10 00:58:59.731819 systemd[1]: run-netns-cni\x2d48012421\x2df3bd\x2d35c6\x2dfef0\x2df9b4d3ed94d6.mount: Deactivated successfully. Jul 10 00:58:59.731868 systemd[1]: run-netns-cni\x2d6c508521\x2d0e84\x2dea10\x2d5f03\x2d97b8a6536dcf.mount: Deactivated successfully. Jul 10 00:58:59.731902 systemd[1]: run-netns-cni\x2d4710eae4\x2d8729\x2d1e70\x2d8374\x2d848b5272e8fc.mount: Deactivated successfully. Jul 10 00:58:59.731931 systemd[1]: run-netns-cni\x2daf9d93d1\x2d3e11\x2ddd90\x2d1c82\x2d656279ba2244.mount: Deactivated successfully. Jul 10 00:58:59.920179 systemd-networkd[1059]: cali9791e28cf41: Link UP Jul 10 00:58:59.922727 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 10 00:58:59.922967 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9791e28cf41: link becomes ready Jul 10 00:58:59.923519 systemd-networkd[1059]: cali9791e28cf41: Gained carrier Jul 10 00:58:59.988479 env[1248]: 2025-07-10 00:58:59.822 [INFO][4191] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0 calico-apiserver-6765fdc8c8- calico-apiserver 929acd7b-6935-4495-be2b-b8264653f84a 995 0 2025-07-10 00:58:27 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6765fdc8c8 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-6765fdc8c8-5kgrr eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali9791e28cf41 [] [] }} ContainerID="4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" Namespace="calico-apiserver" Pod="calico-apiserver-6765fdc8c8-5kgrr" WorkloadEndpoint="localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-" Jul 10 00:58:59.988479 env[1248]: 2025-07-10 00:58:59.822 [INFO][4191] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" Namespace="calico-apiserver" Pod="calico-apiserver-6765fdc8c8-5kgrr" WorkloadEndpoint="localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0" Jul 10 00:58:59.988479 env[1248]: 2025-07-10 00:58:59.859 [INFO][4202] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" HandleID="k8s-pod-network.4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0" Jul 10 00:58:59.988479 env[1248]: 2025-07-10 00:58:59.862 [INFO][4202] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" HandleID="k8s-pod-network.4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4ff0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-6765fdc8c8-5kgrr", "timestamp":"2025-07-10 00:58:59.859816443 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:58:59.988479 env[1248]: 2025-07-10 00:58:59.862 [INFO][4202] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:58:59.988479 env[1248]: 2025-07-10 00:58:59.862 [INFO][4202] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:58:59.988479 env[1248]: 2025-07-10 00:58:59.862 [INFO][4202] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Jul 10 00:58:59.988479 env[1248]: 2025-07-10 00:58:59.880 [INFO][4202] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" host="localhost" Jul 10 00:58:59.988479 env[1248]: 2025-07-10 00:58:59.883 [INFO][4202] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Jul 10 00:58:59.988479 env[1248]: 2025-07-10 00:58:59.890 [INFO][4202] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Jul 10 00:58:59.988479 env[1248]: 2025-07-10 00:58:59.896 [INFO][4202] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Jul 10 00:58:59.988479 env[1248]: 2025-07-10 00:58:59.899 [INFO][4202] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Jul 10 00:58:59.988479 env[1248]: 2025-07-10 00:58:59.899 [INFO][4202] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" host="localhost" Jul 10 00:58:59.988479 env[1248]: 2025-07-10 00:58:59.901 [INFO][4202] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd Jul 10 00:58:59.988479 env[1248]: 2025-07-10 00:58:59.904 [INFO][4202] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" host="localhost" Jul 10 00:58:59.988479 env[1248]: 2025-07-10 00:58:59.910 [INFO][4202] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" host="localhost" Jul 10 00:58:59.988479 env[1248]: 2025-07-10 00:58:59.910 [INFO][4202] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" host="localhost" Jul 10 00:58:59.988479 env[1248]: 2025-07-10 00:58:59.910 [INFO][4202] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:58:59.988479 env[1248]: 2025-07-10 00:58:59.910 [INFO][4202] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" HandleID="k8s-pod-network.4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0" Jul 10 00:58:59.986000 audit[4234]: NETFILTER_CFG table=filter:112 family=2 entries=59 op=nft_register_chain pid=4234 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:58:59.986000 audit[4234]: SYSCALL arch=c000003e syscall=46 success=yes exit=29492 a0=3 a1=7ffc690b9490 a2=0 a3=7ffc690b947c items=0 ppid=3380 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:58:59.986000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:58:59.993439 env[1248]: 2025-07-10 00:58:59.914 [INFO][4191] cni-plugin/k8s.go 418: Populated endpoint ContainerID="4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" Namespace="calico-apiserver" Pod="calico-apiserver-6765fdc8c8-5kgrr" WorkloadEndpoint="localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0", GenerateName:"calico-apiserver-6765fdc8c8-", Namespace:"calico-apiserver", SelfLink:"", UID:"929acd7b-6935-4495-be2b-b8264653f84a", ResourceVersion:"995", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6765fdc8c8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-6765fdc8c8-5kgrr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9791e28cf41", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:58:59.993439 env[1248]: 2025-07-10 00:58:59.914 [INFO][4191] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.134/32] ContainerID="4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" Namespace="calico-apiserver" Pod="calico-apiserver-6765fdc8c8-5kgrr" WorkloadEndpoint="localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0" Jul 10 00:58:59.993439 env[1248]: 2025-07-10 00:58:59.914 [INFO][4191] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9791e28cf41 ContainerID="4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" Namespace="calico-apiserver" Pod="calico-apiserver-6765fdc8c8-5kgrr" WorkloadEndpoint="localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0" Jul 10 00:58:59.993439 env[1248]: 2025-07-10 00:58:59.923 [INFO][4191] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" Namespace="calico-apiserver" Pod="calico-apiserver-6765fdc8c8-5kgrr" WorkloadEndpoint="localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0" Jul 10 00:58:59.993439 env[1248]: 2025-07-10 00:58:59.924 [INFO][4191] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" Namespace="calico-apiserver" Pod="calico-apiserver-6765fdc8c8-5kgrr" WorkloadEndpoint="localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0", GenerateName:"calico-apiserver-6765fdc8c8-", Namespace:"calico-apiserver", SelfLink:"", UID:"929acd7b-6935-4495-be2b-b8264653f84a", ResourceVersion:"995", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6765fdc8c8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd", Pod:"calico-apiserver-6765fdc8c8-5kgrr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9791e28cf41", MAC:"5a:4b:de:e1:1c:30", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:58:59.993439 env[1248]: 2025-07-10 00:58:59.934 [INFO][4191] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" Namespace="calico-apiserver" Pod="calico-apiserver-6765fdc8c8-5kgrr" WorkloadEndpoint="localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0" Jul 10 00:59:00.080316 systemd-networkd[1059]: cali2d2672c812b: Link UP Jul 10 00:59:00.082401 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2d2672c812b: link becomes ready Jul 10 00:59:00.082388 systemd-networkd[1059]: cali2d2672c812b: Gained carrier Jul 10 00:59:00.092409 env[1248]: time="2025-07-10T00:59:00.091031075Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:59:00.092409 env[1248]: time="2025-07-10T00:59:00.091840444Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:59:00.092409 env[1248]: time="2025-07-10T00:59:00.091851811Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:59:00.092409 env[1248]: time="2025-07-10T00:59:00.092006873Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd pid=4277 runtime=io.containerd.runc.v2 Jul 10 00:59:00.108802 env[1248]: 2025-07-10 00:58:59.978 [INFO][4208] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-goldmane--768f4c5c69--6bh96-eth0 goldmane-768f4c5c69- calico-system dfc77fd4-c756-489e-a5e3-3692e4542650 997 0 2025-07-10 00:58:29 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:768f4c5c69 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s localhost goldmane-768f4c5c69-6bh96 eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali2d2672c812b [] [] }} ContainerID="bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d" Namespace="calico-system" Pod="goldmane-768f4c5c69-6bh96" WorkloadEndpoint="localhost-k8s-goldmane--768f4c5c69--6bh96-" Jul 10 00:59:00.108802 env[1248]: 2025-07-10 00:58:59.978 [INFO][4208] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d" Namespace="calico-system" Pod="goldmane-768f4c5c69-6bh96" WorkloadEndpoint="localhost-k8s-goldmane--768f4c5c69--6bh96-eth0" Jul 10 00:59:00.108802 env[1248]: 2025-07-10 00:59:00.039 [INFO][4241] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d" HandleID="k8s-pod-network.bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d" Workload="localhost-k8s-goldmane--768f4c5c69--6bh96-eth0" Jul 10 00:59:00.108802 env[1248]: 2025-07-10 00:59:00.039 [INFO][4241] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d" HandleID="k8s-pod-network.bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d" Workload="localhost-k8s-goldmane--768f4c5c69--6bh96-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cd640), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"goldmane-768f4c5c69-6bh96", "timestamp":"2025-07-10 00:59:00.039564576 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:59:00.108802 env[1248]: 2025-07-10 00:59:00.039 [INFO][4241] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:59:00.108802 env[1248]: 2025-07-10 00:59:00.039 [INFO][4241] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:59:00.108802 env[1248]: 2025-07-10 00:59:00.039 [INFO][4241] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Jul 10 00:59:00.108802 env[1248]: 2025-07-10 00:59:00.045 [INFO][4241] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d" host="localhost" Jul 10 00:59:00.108802 env[1248]: 2025-07-10 00:59:00.049 [INFO][4241] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Jul 10 00:59:00.108802 env[1248]: 2025-07-10 00:59:00.052 [INFO][4241] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Jul 10 00:59:00.108802 env[1248]: 2025-07-10 00:59:00.054 [INFO][4241] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Jul 10 00:59:00.108802 env[1248]: 2025-07-10 00:59:00.056 [INFO][4241] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Jul 10 00:59:00.108802 env[1248]: 2025-07-10 00:59:00.056 [INFO][4241] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d" host="localhost" Jul 10 00:59:00.108802 env[1248]: 2025-07-10 00:59:00.057 [INFO][4241] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d Jul 10 00:59:00.108802 env[1248]: 2025-07-10 00:59:00.061 [INFO][4241] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d" host="localhost" Jul 10 00:59:00.108802 env[1248]: 2025-07-10 00:59:00.072 [INFO][4241] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.135/26] block=192.168.88.128/26 handle="k8s-pod-network.bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d" host="localhost" Jul 10 00:59:00.108802 env[1248]: 2025-07-10 00:59:00.072 [INFO][4241] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.135/26] handle="k8s-pod-network.bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d" host="localhost" Jul 10 00:59:00.108802 env[1248]: 2025-07-10 00:59:00.072 [INFO][4241] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:59:00.108802 env[1248]: 2025-07-10 00:59:00.072 [INFO][4241] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.135/26] IPv6=[] ContainerID="bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d" HandleID="k8s-pod-network.bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d" Workload="localhost-k8s-goldmane--768f4c5c69--6bh96-eth0" Jul 10 00:59:00.120425 env[1248]: 2025-07-10 00:59:00.075 [INFO][4208] cni-plugin/k8s.go 418: Populated endpoint ContainerID="bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d" Namespace="calico-system" Pod="goldmane-768f4c5c69-6bh96" WorkloadEndpoint="localhost-k8s-goldmane--768f4c5c69--6bh96-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--768f4c5c69--6bh96-eth0", GenerateName:"goldmane-768f4c5c69-", Namespace:"calico-system", SelfLink:"", UID:"dfc77fd4-c756-489e-a5e3-3692e4542650", ResourceVersion:"997", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"768f4c5c69", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"goldmane-768f4c5c69-6bh96", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali2d2672c812b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:59:00.120425 env[1248]: 2025-07-10 00:59:00.075 [INFO][4208] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.135/32] ContainerID="bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d" Namespace="calico-system" Pod="goldmane-768f4c5c69-6bh96" WorkloadEndpoint="localhost-k8s-goldmane--768f4c5c69--6bh96-eth0" Jul 10 00:59:00.120425 env[1248]: 2025-07-10 00:59:00.076 [INFO][4208] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2d2672c812b ContainerID="bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d" Namespace="calico-system" Pod="goldmane-768f4c5c69-6bh96" WorkloadEndpoint="localhost-k8s-goldmane--768f4c5c69--6bh96-eth0" Jul 10 00:59:00.120425 env[1248]: 2025-07-10 00:59:00.083 [INFO][4208] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d" Namespace="calico-system" Pod="goldmane-768f4c5c69-6bh96" WorkloadEndpoint="localhost-k8s-goldmane--768f4c5c69--6bh96-eth0" Jul 10 00:59:00.120425 env[1248]: 2025-07-10 00:59:00.084 [INFO][4208] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d" Namespace="calico-system" Pod="goldmane-768f4c5c69-6bh96" WorkloadEndpoint="localhost-k8s-goldmane--768f4c5c69--6bh96-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--768f4c5c69--6bh96-eth0", GenerateName:"goldmane-768f4c5c69-", Namespace:"calico-system", SelfLink:"", UID:"dfc77fd4-c756-489e-a5e3-3692e4542650", ResourceVersion:"997", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"768f4c5c69", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d", Pod:"goldmane-768f4c5c69-6bh96", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali2d2672c812b", MAC:"22:4e:89:2c:f2:6f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:59:00.120425 env[1248]: 2025-07-10 00:59:00.106 [INFO][4208] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d" Namespace="calico-system" Pod="goldmane-768f4c5c69-6bh96" WorkloadEndpoint="localhost-k8s-goldmane--768f4c5c69--6bh96-eth0" Jul 10 00:59:00.130624 systemd[1]: Started cri-containerd-4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd.scope. Jul 10 00:59:00.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.141000 audit: BPF prog-id=189 op=LOAD Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4277 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464643533633631616166653834386135613636336239643539373165 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4277 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464643533633631616166653834386135613636336239643539373165 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit: BPF prog-id=190 op=LOAD Jul 10 00:59:00.142000 audit[4288]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00031aa50 items=0 ppid=4277 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464643533633631616166653834386135613636336239643539373165 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit: BPF prog-id=191 op=LOAD Jul 10 00:59:00.142000 audit[4288]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00031aa98 items=0 ppid=4277 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464643533633631616166653834386135613636336239643539373165 Jul 10 00:59:00.142000 audit: BPF prog-id=191 op=UNLOAD Jul 10 00:59:00.142000 audit: BPF prog-id=190 op=UNLOAD Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.142000 audit: BPF prog-id=192 op=LOAD Jul 10 00:59:00.142000 audit[4288]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00031aea8 items=0 ppid=4277 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464643533633631616166653834386135613636336239643539373165 Jul 10 00:59:00.187000 audit[4331]: NETFILTER_CFG table=filter:113 family=2 entries=60 op=nft_register_chain pid=4331 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:59:00.187000 audit[4331]: SYSCALL arch=c000003e syscall=46 success=yes exit=29916 a0=3 a1=7ffd6f6efd90 a2=0 a3=7ffd6f6efd7c items=0 ppid=3380 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.187000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:59:00.144640 systemd-resolved[1203]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:59:00.213850 env[1248]: time="2025-07-10T00:59:00.164937103Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6765fdc8c8-5kgrr,Uid:929acd7b-6935-4495-be2b-b8264653f84a,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd\"" Jul 10 00:59:00.238190 env[1248]: time="2025-07-10T00:59:00.238055683Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:59:00.238190 env[1248]: time="2025-07-10T00:59:00.238087629Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:59:00.238190 env[1248]: time="2025-07-10T00:59:00.238097271Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:59:00.238326 env[1248]: time="2025-07-10T00:59:00.238209963Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d pid=4339 runtime=io.containerd.runc.v2 Jul 10 00:59:00.247872 systemd[1]: Started cri-containerd-bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d.scope. Jul 10 00:59:00.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit: BPF prog-id=193 op=LOAD Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4339 pid=4346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263346466333139353738303738333532393333636132343365323138 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4339 pid=4346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263346466333139353738303738333532393333636132343365323138 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit: BPF prog-id=194 op=LOAD Jul 10 00:59:00.265000 audit[4346]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002d9ce0 items=0 ppid=4339 pid=4346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263346466333139353738303738333532393333636132343365323138 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit: BPF prog-id=195 op=LOAD Jul 10 00:59:00.265000 audit[4346]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002d9d28 items=0 ppid=4339 pid=4346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263346466333139353738303738333532393333636132343365323138 Jul 10 00:59:00.265000 audit: BPF prog-id=195 op=UNLOAD Jul 10 00:59:00.265000 audit: BPF prog-id=194 op=UNLOAD Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.265000 audit: BPF prog-id=196 op=LOAD Jul 10 00:59:00.265000 audit[4346]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00035c138 items=0 ppid=4339 pid=4346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263346466333139353738303738333532393333636132343365323138 Jul 10 00:59:00.267517 systemd-resolved[1203]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:59:00.287896 env[1248]: time="2025-07-10T00:59:00.287866755Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-768f4c5c69-6bh96,Uid:dfc77fd4-c756-489e-a5e3-3692e4542650,Namespace:calico-system,Attempt:1,} returns sandbox id \"bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d\"" Jul 10 00:59:00.315194 systemd-networkd[1059]: cali7f23319bf9e: Link UP Jul 10 00:59:00.321446 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7f23319bf9e: link becomes ready Jul 10 00:59:00.316900 systemd-networkd[1059]: cali7f23319bf9e: Gained carrier Jul 10 00:59:00.351802 env[1248]: 2025-07-10 00:59:00.011 [INFO][4222] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--d6d57-eth0 coredns-668d6bf9bc- kube-system 1b07da51-61a4-4653-83cd-4b8b69b6c8c0 996 0 2025-07-10 00:58:18 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-d6d57 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali7f23319bf9e [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd" Namespace="kube-system" Pod="coredns-668d6bf9bc-d6d57" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--d6d57-" Jul 10 00:59:00.351802 env[1248]: 2025-07-10 00:59:00.011 [INFO][4222] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd" Namespace="kube-system" Pod="coredns-668d6bf9bc-d6d57" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--d6d57-eth0" Jul 10 00:59:00.351802 env[1248]: 2025-07-10 00:59:00.095 [INFO][4254] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd" HandleID="k8s-pod-network.e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd" Workload="localhost-k8s-coredns--668d6bf9bc--d6d57-eth0" Jul 10 00:59:00.351802 env[1248]: 2025-07-10 00:59:00.095 [INFO][4254] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd" HandleID="k8s-pod-network.e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd" Workload="localhost-k8s-coredns--668d6bf9bc--d6d57-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c9070), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-d6d57", "timestamp":"2025-07-10 00:59:00.095556761 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:59:00.351802 env[1248]: 2025-07-10 00:59:00.095 [INFO][4254] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:59:00.351802 env[1248]: 2025-07-10 00:59:00.095 [INFO][4254] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:59:00.351802 env[1248]: 2025-07-10 00:59:00.095 [INFO][4254] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Jul 10 00:59:00.351802 env[1248]: 2025-07-10 00:59:00.174 [INFO][4254] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd" host="localhost" Jul 10 00:59:00.351802 env[1248]: 2025-07-10 00:59:00.177 [INFO][4254] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Jul 10 00:59:00.351802 env[1248]: 2025-07-10 00:59:00.181 [INFO][4254] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Jul 10 00:59:00.351802 env[1248]: 2025-07-10 00:59:00.182 [INFO][4254] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Jul 10 00:59:00.351802 env[1248]: 2025-07-10 00:59:00.183 [INFO][4254] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Jul 10 00:59:00.351802 env[1248]: 2025-07-10 00:59:00.183 [INFO][4254] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd" host="localhost" Jul 10 00:59:00.351802 env[1248]: 2025-07-10 00:59:00.185 [INFO][4254] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd Jul 10 00:59:00.351802 env[1248]: 2025-07-10 00:59:00.195 [INFO][4254] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd" host="localhost" Jul 10 00:59:00.351802 env[1248]: 2025-07-10 00:59:00.308 [INFO][4254] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.136/26] block=192.168.88.128/26 handle="k8s-pod-network.e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd" host="localhost" Jul 10 00:59:00.351802 env[1248]: 2025-07-10 00:59:00.308 [INFO][4254] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.136/26] handle="k8s-pod-network.e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd" host="localhost" Jul 10 00:59:00.351802 env[1248]: 2025-07-10 00:59:00.308 [INFO][4254] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:59:00.351802 env[1248]: 2025-07-10 00:59:00.308 [INFO][4254] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.136/26] IPv6=[] ContainerID="e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd" HandleID="k8s-pod-network.e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd" Workload="localhost-k8s-coredns--668d6bf9bc--d6d57-eth0" Jul 10 00:59:00.356387 env[1248]: 2025-07-10 00:59:00.310 [INFO][4222] cni-plugin/k8s.go 418: Populated endpoint ContainerID="e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd" Namespace="kube-system" Pod="coredns-668d6bf9bc-d6d57" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--d6d57-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--d6d57-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"1b07da51-61a4-4653-83cd-4b8b69b6c8c0", ResourceVersion:"996", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-d6d57", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7f23319bf9e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:59:00.356387 env[1248]: 2025-07-10 00:59:00.310 [INFO][4222] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.136/32] ContainerID="e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd" Namespace="kube-system" Pod="coredns-668d6bf9bc-d6d57" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--d6d57-eth0" Jul 10 00:59:00.356387 env[1248]: 2025-07-10 00:59:00.310 [INFO][4222] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7f23319bf9e ContainerID="e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd" Namespace="kube-system" Pod="coredns-668d6bf9bc-d6d57" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--d6d57-eth0" Jul 10 00:59:00.356387 env[1248]: 2025-07-10 00:59:00.317 [INFO][4222] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd" Namespace="kube-system" Pod="coredns-668d6bf9bc-d6d57" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--d6d57-eth0" Jul 10 00:59:00.356387 env[1248]: 2025-07-10 00:59:00.318 [INFO][4222] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd" Namespace="kube-system" Pod="coredns-668d6bf9bc-d6d57" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--d6d57-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--d6d57-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"1b07da51-61a4-4653-83cd-4b8b69b6c8c0", ResourceVersion:"996", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd", Pod:"coredns-668d6bf9bc-d6d57", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7f23319bf9e", MAC:"a2:b0:62:8f:cd:aa", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:59:00.356687 env[1248]: 2025-07-10 00:59:00.349 [INFO][4222] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd" Namespace="kube-system" Pod="coredns-668d6bf9bc-d6d57" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--d6d57-eth0" Jul 10 00:59:00.379026 systemd-networkd[1059]: cali0c5a612c4ad: Link UP Jul 10 00:59:00.382884 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0c5a612c4ad: link becomes ready Jul 10 00:59:00.382780 systemd-networkd[1059]: cali0c5a612c4ad: Gained carrier Jul 10 00:59:00.400273 env[1248]: 2025-07-10 00:59:00.109 [INFO][4260] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0 calico-apiserver-6765fdc8c8- calico-apiserver e40791bb-1dd3-4f13-a751-d75795ef4c90 998 0 2025-07-10 00:58:27 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6765fdc8c8 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-6765fdc8c8-2wnxd eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali0c5a612c4ad [] [] }} ContainerID="58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" Namespace="calico-apiserver" Pod="calico-apiserver-6765fdc8c8-2wnxd" WorkloadEndpoint="localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-" Jul 10 00:59:00.400273 env[1248]: 2025-07-10 00:59:00.109 [INFO][4260] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" Namespace="calico-apiserver" Pod="calico-apiserver-6765fdc8c8-2wnxd" WorkloadEndpoint="localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0" Jul 10 00:59:00.400273 env[1248]: 2025-07-10 00:59:00.187 [INFO][4307] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" HandleID="k8s-pod-network.58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0" Jul 10 00:59:00.400273 env[1248]: 2025-07-10 00:59:00.187 [INFO][4307] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" HandleID="k8s-pod-network.58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cd600), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-6765fdc8c8-2wnxd", "timestamp":"2025-07-10 00:59:00.18752816 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:59:00.400273 env[1248]: 2025-07-10 00:59:00.187 [INFO][4307] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:59:00.400273 env[1248]: 2025-07-10 00:59:00.308 [INFO][4307] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:59:00.400273 env[1248]: 2025-07-10 00:59:00.309 [INFO][4307] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Jul 10 00:59:00.400273 env[1248]: 2025-07-10 00:59:00.319 [INFO][4307] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" host="localhost" Jul 10 00:59:00.400273 env[1248]: 2025-07-10 00:59:00.336 [INFO][4307] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Jul 10 00:59:00.400273 env[1248]: 2025-07-10 00:59:00.351 [INFO][4307] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Jul 10 00:59:00.400273 env[1248]: 2025-07-10 00:59:00.352 [INFO][4307] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Jul 10 00:59:00.400273 env[1248]: 2025-07-10 00:59:00.358 [INFO][4307] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Jul 10 00:59:00.400273 env[1248]: 2025-07-10 00:59:00.358 [INFO][4307] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" host="localhost" Jul 10 00:59:00.400273 env[1248]: 2025-07-10 00:59:00.359 [INFO][4307] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa Jul 10 00:59:00.400273 env[1248]: 2025-07-10 00:59:00.365 [INFO][4307] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" host="localhost" Jul 10 00:59:00.400273 env[1248]: 2025-07-10 00:59:00.373 [INFO][4307] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.137/26] block=192.168.88.128/26 handle="k8s-pod-network.58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" host="localhost" Jul 10 00:59:00.400273 env[1248]: 2025-07-10 00:59:00.373 [INFO][4307] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.137/26] handle="k8s-pod-network.58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" host="localhost" Jul 10 00:59:00.400273 env[1248]: 2025-07-10 00:59:00.373 [INFO][4307] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:59:00.400273 env[1248]: 2025-07-10 00:59:00.373 [INFO][4307] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.137/26] IPv6=[] ContainerID="58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" HandleID="k8s-pod-network.58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0" Jul 10 00:59:00.405000 audit[4384]: NETFILTER_CFG table=filter:114 family=2 entries=58 op=nft_register_chain pid=4384 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:59:00.405000 audit[4384]: SYSCALL arch=c000003e syscall=46 success=yes exit=26744 a0=3 a1=7fff5d9f7050 a2=0 a3=7fff5d9f703c items=0 ppid=3380 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.405000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:59:00.420169 env[1248]: 2025-07-10 00:59:00.376 [INFO][4260] cni-plugin/k8s.go 418: Populated endpoint ContainerID="58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" Namespace="calico-apiserver" Pod="calico-apiserver-6765fdc8c8-2wnxd" WorkloadEndpoint="localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0", GenerateName:"calico-apiserver-6765fdc8c8-", Namespace:"calico-apiserver", SelfLink:"", UID:"e40791bb-1dd3-4f13-a751-d75795ef4c90", ResourceVersion:"998", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6765fdc8c8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-6765fdc8c8-2wnxd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.137/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0c5a612c4ad", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:59:00.420169 env[1248]: 2025-07-10 00:59:00.376 [INFO][4260] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.137/32] ContainerID="58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" Namespace="calico-apiserver" Pod="calico-apiserver-6765fdc8c8-2wnxd" WorkloadEndpoint="localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0" Jul 10 00:59:00.420169 env[1248]: 2025-07-10 00:59:00.376 [INFO][4260] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0c5a612c4ad ContainerID="58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" Namespace="calico-apiserver" Pod="calico-apiserver-6765fdc8c8-2wnxd" WorkloadEndpoint="localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0" Jul 10 00:59:00.420169 env[1248]: 2025-07-10 00:59:00.385 [INFO][4260] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" Namespace="calico-apiserver" Pod="calico-apiserver-6765fdc8c8-2wnxd" WorkloadEndpoint="localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0" Jul 10 00:59:00.420169 env[1248]: 2025-07-10 00:59:00.385 [INFO][4260] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" Namespace="calico-apiserver" Pod="calico-apiserver-6765fdc8c8-2wnxd" WorkloadEndpoint="localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0", GenerateName:"calico-apiserver-6765fdc8c8-", Namespace:"calico-apiserver", SelfLink:"", UID:"e40791bb-1dd3-4f13-a751-d75795ef4c90", ResourceVersion:"998", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6765fdc8c8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa", Pod:"calico-apiserver-6765fdc8c8-2wnxd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.137/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0c5a612c4ad", MAC:"06:7c:f9:8e:37:8f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:59:00.420169 env[1248]: 2025-07-10 00:59:00.396 [INFO][4260] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" Namespace="calico-apiserver" Pod="calico-apiserver-6765fdc8c8-2wnxd" WorkloadEndpoint="localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0" Jul 10 00:59:00.423438 env[1248]: time="2025-07-10T00:59:00.422540754Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:59:00.423438 env[1248]: time="2025-07-10T00:59:00.422581114Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:59:00.423438 env[1248]: time="2025-07-10T00:59:00.422599691Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:59:00.423438 env[1248]: time="2025-07-10T00:59:00.422734118Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd pid=4397 runtime=io.containerd.runc.v2 Jul 10 00:59:00.434000 audit[4414]: NETFILTER_CFG table=filter:115 family=2 entries=57 op=nft_register_chain pid=4414 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:59:00.434000 audit[4414]: SYSCALL arch=c000003e syscall=46 success=yes exit=27796 a0=3 a1=7ffd97461a80 a2=0 a3=7ffd97461a6c items=0 ppid=3380 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.434000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:59:00.443430 env[1248]: time="2025-07-10T00:59:00.442984225Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:59:00.443430 env[1248]: time="2025-07-10T00:59:00.443035023Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:59:00.443430 env[1248]: time="2025-07-10T00:59:00.443051940Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:59:00.443430 env[1248]: time="2025-07-10T00:59:00.443177381Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa pid=4413 runtime=io.containerd.runc.v2 Jul 10 00:59:00.454847 systemd[1]: Started cri-containerd-e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd.scope. Jul 10 00:59:00.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.465000 audit: BPF prog-id=197 op=LOAD Jul 10 00:59:00.466000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.466000 audit[4417]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4397 pid=4417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.466000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534383161356333656462306563626365316539376430633938363563 Jul 10 00:59:00.467000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.467000 audit[4417]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4397 pid=4417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534383161356333656462306563626365316539376430633938363563 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit: BPF prog-id=198 op=LOAD Jul 10 00:59:00.469000 audit[4417]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000216350 items=0 ppid=4397 pid=4417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534383161356333656462306563626365316539376430633938363563 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit: BPF prog-id=199 op=LOAD Jul 10 00:59:00.469000 audit[4417]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000216398 items=0 ppid=4397 pid=4417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534383161356333656462306563626365316539376430633938363563 Jul 10 00:59:00.469000 audit: BPF prog-id=199 op=UNLOAD Jul 10 00:59:00.469000 audit: BPF prog-id=198 op=UNLOAD Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { perfmon } for pid=4417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit[4417]: AVC avc: denied { bpf } for pid=4417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.469000 audit: BPF prog-id=200 op=LOAD Jul 10 00:59:00.469000 audit[4417]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002167a8 items=0 ppid=4397 pid=4417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534383161356333656462306563626365316539376430633938363563 Jul 10 00:59:00.471789 systemd-resolved[1203]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:59:00.476288 systemd[1]: Started cri-containerd-58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa.scope. Jul 10 00:59:00.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.489000 audit: BPF prog-id=201 op=LOAD Jul 10 00:59:00.490000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.490000 audit[4426]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4413 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538633362396163666630323863633662333832646466313866316264 Jul 10 00:59:00.490000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.490000 audit[4426]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4413 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538633362396163666630323863633662333832646466313866316264 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit: BPF prog-id=202 op=LOAD Jul 10 00:59:00.491000 audit[4426]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000306c70 items=0 ppid=4413 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538633362396163666630323863633662333832646466313866316264 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit: BPF prog-id=203 op=LOAD Jul 10 00:59:00.491000 audit[4426]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000306cb8 items=0 ppid=4413 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538633362396163666630323863633662333832646466313866316264 Jul 10 00:59:00.491000 audit: BPF prog-id=203 op=UNLOAD Jul 10 00:59:00.491000 audit: BPF prog-id=202 op=UNLOAD Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.491000 audit: BPF prog-id=204 op=LOAD Jul 10 00:59:00.491000 audit[4426]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003070c8 items=0 ppid=4413 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538633362396163666630323863633662333832646466313866316264 Jul 10 00:59:00.496396 systemd-resolved[1203]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:59:00.502078 env[1248]: time="2025-07-10T00:59:00.499796109Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-d6d57,Uid:1b07da51-61a4-4653-83cd-4b8b69b6c8c0,Namespace:kube-system,Attempt:1,} returns sandbox id \"e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd\"" Jul 10 00:59:00.523609 env[1248]: time="2025-07-10T00:59:00.523550298Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6765fdc8c8-2wnxd,Uid:e40791bb-1dd3-4f13-a751-d75795ef4c90,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa\"" Jul 10 00:59:00.760873 systemd-networkd[1059]: cali97467c81b48: Gained IPv6LL Jul 10 00:59:00.860044 env[1248]: time="2025-07-10T00:59:00.860019680Z" level=info msg="CreateContainer within sandbox \"e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 10 00:59:00.907997 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1927422938.mount: Deactivated successfully. Jul 10 00:59:00.913893 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4241332551.mount: Deactivated successfully. Jul 10 00:59:00.915119 env[1248]: time="2025-07-10T00:59:00.915091736Z" level=info msg="CreateContainer within sandbox \"e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f61be21d4a61110fb9abaec28ffa20b28f7eff3eda4fff7da63a4e0479cd5742\"" Jul 10 00:59:00.917258 env[1248]: time="2025-07-10T00:59:00.916409986Z" level=info msg="StartContainer for \"f61be21d4a61110fb9abaec28ffa20b28f7eff3eda4fff7da63a4e0479cd5742\"" Jul 10 00:59:00.938189 systemd[1]: Started cri-containerd-f61be21d4a61110fb9abaec28ffa20b28f7eff3eda4fff7da63a4e0479cd5742.scope. Jul 10 00:59:00.952814 systemd-networkd[1059]: calibf75d8591a4: Gained IPv6LL Jul 10 00:59:00.960174 kernel: kauditd_printk_skb: 602 callbacks suppressed Jul 10 00:59:00.960256 kernel: audit: type=1400 audit(1752109140.955:1319): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.972618 kernel: audit: type=1400 audit(1752109140.955:1320): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.972663 kernel: audit: type=1400 audit(1752109140.955:1321): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.972679 kernel: audit: type=1400 audit(1752109140.955:1322): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.972694 kernel: audit: type=1400 audit(1752109140.955:1323): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.976335 kernel: audit: type=1400 audit(1752109140.955:1324): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.981314 kernel: audit: type=1400 audit(1752109140.955:1325): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.981357 kernel: audit: type=1400 audit(1752109140.955:1326): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.986685 kernel: audit: type=1400 audit(1752109140.955:1327): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.991599 kernel: audit: type=1400 audit(1752109140.955:1328): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.955000 audit: BPF prog-id=205 op=LOAD Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4397 pid=4481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636316265323164346136313131306662396162616563323866666132 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4397 pid=4481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636316265323164346136313131306662396162616563323866666132 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit: BPF prog-id=206 op=LOAD Jul 10 00:59:00.959000 audit[4481]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0001af2f0 items=0 ppid=4397 pid=4481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636316265323164346136313131306662396162616563323866666132 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit: BPF prog-id=207 op=LOAD Jul 10 00:59:00.959000 audit[4481]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0001af338 items=0 ppid=4397 pid=4481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636316265323164346136313131306662396162616563323866666132 Jul 10 00:59:00.959000 audit: BPF prog-id=207 op=UNLOAD Jul 10 00:59:00.959000 audit: BPF prog-id=206 op=UNLOAD Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:00.959000 audit: BPF prog-id=208 op=LOAD Jul 10 00:59:00.959000 audit[4481]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0001af748 items=0 ppid=4397 pid=4481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:00.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636316265323164346136313131306662396162616563323866666132 Jul 10 00:59:01.003491 env[1248]: time="2025-07-10T00:59:01.003469292Z" level=info msg="StartContainer for \"f61be21d4a61110fb9abaec28ffa20b28f7eff3eda4fff7da63a4e0479cd5742\" returns successfully" Jul 10 00:59:01.154346 env[1248]: time="2025-07-10T00:59:01.151998194Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:01.157126 env[1248]: time="2025-07-10T00:59:01.157090667Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:761b294e26556b58aabc85094a3d465389e6b141b7400aee732bd13400a6124a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:01.159553 env[1248]: time="2025-07-10T00:59:01.158926309Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:01.159553 env[1248]: time="2025-07-10T00:59:01.159392865Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:5d3ecdec3cbbe8f7009077102e35e8a2141161b59c548cf3f97829177677cbce,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:01.160862 env[1248]: time="2025-07-10T00:59:01.160438751Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.2\" returns image reference \"sha256:761b294e26556b58aabc85094a3d465389e6b141b7400aee732bd13400a6124a\"" Jul 10 00:59:01.185060 env[1248]: time="2025-07-10T00:59:01.184898657Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.2\"" Jul 10 00:59:01.251068 env[1248]: time="2025-07-10T00:59:01.251038997Z" level=info msg="CreateContainer within sandbox \"f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Jul 10 00:59:01.254000 audit[4491]: AVC avc: denied { getattr } for pid=4491 comm="coredns" path="cgroup:[4026533167]" dev="nsfs" ino=4026533167 scontext=system_u:system_r:svirt_lxc_net_t:s0:c504,c873 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Jul 10 00:59:01.254000 audit[4491]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c000156930 a2=c0000aad38 a3=0 items=0 ppid=4397 pid=4491 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c504,c873 key=(null) Jul 10 00:59:01.254000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Jul 10 00:59:01.262173 env[1248]: time="2025-07-10T00:59:01.262081868Z" level=info msg="CreateContainer within sandbox \"f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"1878eb68a1fa7f84a2d2975e3e1742009fb43094cba1acf405e4153ddd10830d\"" Jul 10 00:59:01.274459 env[1248]: time="2025-07-10T00:59:01.271866319Z" level=info msg="StartContainer for \"1878eb68a1fa7f84a2d2975e3e1742009fb43094cba1acf405e4153ddd10830d\"" Jul 10 00:59:01.272582 systemd-networkd[1059]: cali2d2672c812b: Gained IPv6LL Jul 10 00:59:01.291452 systemd[1]: Started cri-containerd-1878eb68a1fa7f84a2d2975e3e1742009fb43094cba1acf405e4153ddd10830d.scope. Jul 10 00:59:01.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit: BPF prog-id=209 op=LOAD Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3784 pid=4516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:01.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138373865623638613166613766383461326432393735653365313734 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3784 pid=4516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:01.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138373865623638613166613766383461326432393735653365313734 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit: BPF prog-id=210 op=LOAD Jul 10 00:59:01.315000 audit[4516]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002d29c0 items=0 ppid=3784 pid=4516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:01.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138373865623638613166613766383461326432393735653365313734 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit: BPF prog-id=211 op=LOAD Jul 10 00:59:01.315000 audit[4516]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002d2a08 items=0 ppid=3784 pid=4516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:01.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138373865623638613166613766383461326432393735653365313734 Jul 10 00:59:01.315000 audit: BPF prog-id=211 op=UNLOAD Jul 10 00:59:01.315000 audit: BPF prog-id=210 op=UNLOAD Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:01.315000 audit: BPF prog-id=212 op=LOAD Jul 10 00:59:01.315000 audit[4516]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002d2e18 items=0 ppid=3784 pid=4516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:01.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138373865623638613166613766383461326432393735653365313734 Jul 10 00:59:01.347435 env[1248]: time="2025-07-10T00:59:01.347278742Z" level=info msg="StartContainer for \"1878eb68a1fa7f84a2d2975e3e1742009fb43094cba1acf405e4153ddd10830d\" returns successfully" Jul 10 00:59:01.442000 audit[4549]: NETFILTER_CFG table=filter:116 family=2 entries=14 op=nft_register_rule pid=4549 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:01.442000 audit[4549]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc31f56330 a2=0 a3=7ffc31f5631c items=0 ppid=2201 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:01.442000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:01.448000 audit[4549]: NETFILTER_CFG table=nat:117 family=2 entries=44 op=nft_register_rule pid=4549 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:01.448000 audit[4549]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc31f56330 a2=0 a3=7ffc31f5631c items=0 ppid=2201 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:01.448000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:01.592721 systemd-networkd[1059]: cali9791e28cf41: Gained IPv6LL Jul 10 00:59:01.912473 systemd-networkd[1059]: cali0c5a612c4ad: Gained IPv6LL Jul 10 00:59:02.296514 systemd-networkd[1059]: cali7f23319bf9e: Gained IPv6LL Jul 10 00:59:02.501047 kubelet[2097]: I0710 00:59:02.394058 2097 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-d6d57" podStartSLOduration=44.160464107 podStartE2EDuration="44.160464107s" podCreationTimestamp="2025-07-10 00:58:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-07-10 00:59:01.261406488 +0000 UTC m=+49.010804136" watchObservedRunningTime="2025-07-10 00:59:02.160464107 +0000 UTC m=+49.909861762" Jul 10 00:59:02.665672 kubelet[2097]: I0710 00:59:02.665637 2097 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-65594c9c4c-wld2r" podStartSLOduration=27.346856634 podStartE2EDuration="32.66561354s" podCreationTimestamp="2025-07-10 00:58:30 +0000 UTC" firstStartedPulling="2025-07-10 00:58:55.851812071 +0000 UTC m=+43.601209719" lastFinishedPulling="2025-07-10 00:59:01.170568976 +0000 UTC m=+48.919966625" observedRunningTime="2025-07-10 00:59:02.531769062 +0000 UTC m=+50.281166723" watchObservedRunningTime="2025-07-10 00:59:02.66561354 +0000 UTC m=+50.415011195" Jul 10 00:59:02.708000 audit[4555]: NETFILTER_CFG table=filter:118 family=2 entries=14 op=nft_register_rule pid=4555 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:02.708000 audit[4555]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc79bf0ba0 a2=0 a3=7ffc79bf0b8c items=0 ppid=2201 pid=4555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:02.708000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:02.840000 audit[4555]: NETFILTER_CFG table=nat:119 family=2 entries=56 op=nft_register_chain pid=4555 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:02.840000 audit[4555]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffc79bf0ba0 a2=0 a3=7ffc79bf0b8c items=0 ppid=2201 pid=4555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:02.840000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:03.156308 systemd[1]: run-containerd-runc-k8s.io-1878eb68a1fa7f84a2d2975e3e1742009fb43094cba1acf405e4153ddd10830d-runc.OUbYwd.mount: Deactivated successfully. Jul 10 00:59:04.412600 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount989755218.mount: Deactivated successfully. Jul 10 00:59:04.643321 env[1248]: time="2025-07-10T00:59:04.643264377Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker-backend:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:04.666114 env[1248]: time="2025-07-10T00:59:04.666054820Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6ba7e39edcd8be6d32dfccbfdb65533a727b14a19173515e91607d4259f8ee7f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:04.667065 env[1248]: time="2025-07-10T00:59:04.667044815Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/whisker-backend:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:04.668073 env[1248]: time="2025-07-10T00:59:04.668057922Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker-backend@sha256:fbf7f21f5aba95930803ad7e7dea8b083220854eae72c2a7c51681c09c5614b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:04.671534 env[1248]: time="2025-07-10T00:59:04.668512073Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.2\" returns image reference \"sha256:6ba7e39edcd8be6d32dfccbfdb65533a727b14a19173515e91607d4259f8ee7f\"" Jul 10 00:59:04.774676 env[1248]: time="2025-07-10T00:59:04.774653708Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.2\"" Jul 10 00:59:04.814272 env[1248]: time="2025-07-10T00:59:04.814240508Z" level=info msg="CreateContainer within sandbox \"11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3\" for container &ContainerMetadata{Name:whisker-backend,Attempt:0,}" Jul 10 00:59:04.823748 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3967954881.mount: Deactivated successfully. Jul 10 00:59:04.827895 env[1248]: time="2025-07-10T00:59:04.827861994Z" level=info msg="CreateContainer within sandbox \"11397341cf4caab4d4d687cea6a3da4730993056ce2457709345541481c3afd3\" for &ContainerMetadata{Name:whisker-backend,Attempt:0,} returns container id \"6bfc93daa7cd9b6941d792aab3f43e1a1b4dd21330d361570fc18f61cf2298d6\"" Jul 10 00:59:04.830962 env[1248]: time="2025-07-10T00:59:04.830452086Z" level=info msg="StartContainer for \"6bfc93daa7cd9b6941d792aab3f43e1a1b4dd21330d361570fc18f61cf2298d6\"" Jul 10 00:59:04.848845 systemd[1]: Started cri-containerd-6bfc93daa7cd9b6941d792aab3f43e1a1b4dd21330d361570fc18f61cf2298d6.scope. Jul 10 00:59:04.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.860000 audit: BPF prog-id=213 op=LOAD Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { bpf } for pid=4593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3595 pid=4593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:04.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662666339336461613763643962363934316437393261616233663433 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { perfmon } for pid=4593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3595 pid=4593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:04.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662666339336461613763643962363934316437393261616233663433 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { bpf } for pid=4593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { bpf } for pid=4593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { bpf } for pid=4593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { perfmon } for pid=4593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { perfmon } for pid=4593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { perfmon } for pid=4593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { perfmon } for pid=4593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { perfmon } for pid=4593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { bpf } for pid=4593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { bpf } for pid=4593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit: BPF prog-id=214 op=LOAD Jul 10 00:59:04.861000 audit[4593]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032bd20 items=0 ppid=3595 pid=4593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:04.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662666339336461613763643962363934316437393261616233663433 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { bpf } for pid=4593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { bpf } for pid=4593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { perfmon } for pid=4593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { perfmon } for pid=4593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { perfmon } for pid=4593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { perfmon } for pid=4593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { perfmon } for pid=4593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { bpf } for pid=4593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { bpf } for pid=4593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit: BPF prog-id=215 op=LOAD Jul 10 00:59:04.861000 audit[4593]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032bd68 items=0 ppid=3595 pid=4593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:04.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662666339336461613763643962363934316437393261616233663433 Jul 10 00:59:04.861000 audit: BPF prog-id=215 op=UNLOAD Jul 10 00:59:04.861000 audit: BPF prog-id=214 op=UNLOAD Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { bpf } for pid=4593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { bpf } for pid=4593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { bpf } for pid=4593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { perfmon } for pid=4593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { perfmon } for pid=4593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { perfmon } for pid=4593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { perfmon } for pid=4593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { perfmon } for pid=4593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { bpf } for pid=4593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit[4593]: AVC avc: denied { bpf } for pid=4593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:04.861000 audit: BPF prog-id=216 op=LOAD Jul 10 00:59:04.861000 audit[4593]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000396178 items=0 ppid=3595 pid=4593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:04.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662666339336461613763643962363934316437393261616233663433 Jul 10 00:59:04.893546 env[1248]: time="2025-07-10T00:59:04.893485104Z" level=info msg="StartContainer for \"6bfc93daa7cd9b6941d792aab3f43e1a1b4dd21330d361570fc18f61cf2298d6\" returns successfully" Jul 10 00:59:05.173671 kubelet[2097]: I0710 00:59:05.173612 2097 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/whisker-69bf9845cf-g9v7w" podStartSLOduration=2.118915206 podStartE2EDuration="12.170042444s" podCreationTimestamp="2025-07-10 00:58:53 +0000 UTC" firstStartedPulling="2025-07-10 00:58:54.626052051 +0000 UTC m=+42.375449703" lastFinishedPulling="2025-07-10 00:59:04.677179293 +0000 UTC m=+52.426576941" observedRunningTime="2025-07-10 00:59:05.165302593 +0000 UTC m=+52.914700254" watchObservedRunningTime="2025-07-10 00:59:05.170042444 +0000 UTC m=+52.919440093" Jul 10 00:59:05.199000 audit[4623]: NETFILTER_CFG table=filter:120 family=2 entries=13 op=nft_register_rule pid=4623 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:05.199000 audit[4623]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffcc440d1d0 a2=0 a3=7ffcc440d1bc items=0 ppid=2201 pid=4623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:05.199000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:05.204000 audit[4623]: NETFILTER_CFG table=nat:121 family=2 entries=27 op=nft_register_chain pid=4623 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:05.204000 audit[4623]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffcc440d1d0 a2=0 a3=7ffcc440d1bc items=0 ppid=2201 pid=4623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:05.204000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:05.413542 systemd[1]: run-containerd-runc-k8s.io-6bfc93daa7cd9b6941d792aab3f43e1a1b4dd21330d361570fc18f61cf2298d6-runc.DTwJCt.mount: Deactivated successfully. Jul 10 00:59:07.834408 env[1248]: time="2025-07-10T00:59:07.834273123Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:07.838741 env[1248]: time="2025-07-10T00:59:07.838709677Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5509118eed617ef04ca00f5a095bfd0a4cd1cf69edcfcf9bedf0edb641be51dd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:07.840933 env[1248]: time="2025-07-10T00:59:07.840454176Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:07.842848 env[1248]: time="2025-07-10T00:59:07.842823248Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ec6b10660962e7caad70c47755049fad68f9fc2f7064e8bc7cb862583e02cc2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:07.843150 env[1248]: time="2025-07-10T00:59:07.843127228Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.2\" returns image reference \"sha256:5509118eed617ef04ca00f5a095bfd0a4cd1cf69edcfcf9bedf0edb641be51dd\"" Jul 10 00:59:07.864205 env[1248]: time="2025-07-10T00:59:07.864046450Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\"" Jul 10 00:59:07.979459 env[1248]: time="2025-07-10T00:59:07.979325057Z" level=info msg="CreateContainer within sandbox \"22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 10 00:59:07.990953 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1495573450.mount: Deactivated successfully. Jul 10 00:59:07.993521 env[1248]: time="2025-07-10T00:59:07.993494179Z" level=info msg="CreateContainer within sandbox \"22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"df24f8280b4c446d08107bccb4700272faae704fea4cc572da0d06ee857d9f8c\"" Jul 10 00:59:07.993865 env[1248]: time="2025-07-10T00:59:07.993852406Z" level=info msg="StartContainer for \"df24f8280b4c446d08107bccb4700272faae704fea4cc572da0d06ee857d9f8c\"" Jul 10 00:59:08.014965 systemd[1]: Started cri-containerd-df24f8280b4c446d08107bccb4700272faae704fea4cc572da0d06ee857d9f8c.scope. Jul 10 00:59:08.035611 kernel: kauditd_printk_skb: 182 callbacks suppressed Jul 10 00:59:08.085622 kernel: audit: type=1400 audit(1752109148.028:1380): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.095134 kernel: audit: type=1400 audit(1752109148.028:1381): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.095223 kernel: audit: type=1400 audit(1752109148.028:1382): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.095926 kernel: audit: type=1400 audit(1752109148.028:1383): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.096615 kernel: audit: type=1400 audit(1752109148.028:1384): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.097453 kernel: audit: type=1400 audit(1752109148.028:1385): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.097784 kernel: audit: type=1400 audit(1752109148.028:1386): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.097812 kernel: audit: type=1400 audit(1752109148.028:1387): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.098024 kernel: audit: type=1400 audit(1752109148.028:1388): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.098598 kernel: audit: type=1400 audit(1752109148.028:1389): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.028000 audit: BPF prog-id=217 op=LOAD Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4006 pid=4634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:08.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466323466383238306234633434366430383130376263636234373030 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4006 pid=4634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:08.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466323466383238306234633434366430383130376263636234373030 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit: BPF prog-id=218 op=LOAD Jul 10 00:59:08.034000 audit[4634]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002b5db0 items=0 ppid=4006 pid=4634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:08.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466323466383238306234633434366430383130376263636234373030 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit: BPF prog-id=219 op=LOAD Jul 10 00:59:08.034000 audit[4634]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002b5df8 items=0 ppid=4006 pid=4634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:08.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466323466383238306234633434366430383130376263636234373030 Jul 10 00:59:08.034000 audit: BPF prog-id=219 op=UNLOAD Jul 10 00:59:08.034000 audit: BPF prog-id=218 op=UNLOAD Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { perfmon } for pid=4634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit[4634]: AVC avc: denied { bpf } for pid=4634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:08.034000 audit: BPF prog-id=220 op=LOAD Jul 10 00:59:08.034000 audit[4634]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00039c208 items=0 ppid=4006 pid=4634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:08.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466323466383238306234633434366430383130376263636234373030 Jul 10 00:59:08.105512 env[1248]: time="2025-07-10T00:59:08.085815357Z" level=info msg="StartContainer for \"df24f8280b4c446d08107bccb4700272faae704fea4cc572da0d06ee857d9f8c\" returns successfully" Jul 10 00:59:08.233000 audit[4667]: NETFILTER_CFG table=filter:122 family=2 entries=12 op=nft_register_rule pid=4667 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:08.233000 audit[4667]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff2e2f5d10 a2=0 a3=7fff2e2f5cfc items=0 ppid=2201 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:08.233000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:08.236000 audit[4667]: NETFILTER_CFG table=nat:123 family=2 entries=22 op=nft_register_rule pid=4667 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:08.236000 audit[4667]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff2e2f5d10 a2=0 a3=7fff2e2f5cfc items=0 ppid=2201 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:08.236000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:08.660000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:59:08.660000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001924f00 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 00:59:08.660000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 00:59:08.660000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:59:08.660000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00180e450 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 00:59:08.660000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 00:59:08.798000 audit[4645]: AVC avc: denied { watch } for pid=4645 comm="apiserver" path="/calico-apiserver-certs/..2025_07_10_00_58_42.1989100588/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c888 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c888 tclass=file permissive=0 Jul 10 00:59:08.798000 audit[4645]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001b1a360 a2=fc6 a3=0 items=0 ppid=4006 pid=4645 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c888 key=(null) Jul 10 00:59:08.798000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 10 00:59:08.987870 systemd[1]: run-containerd-runc-k8s.io-df24f8280b4c446d08107bccb4700272faae704fea4cc572da0d06ee857d9f8c-runc.Ecbc8T.mount: Deactivated successfully. Jul 10 00:59:09.176233 kubelet[2097]: I0710 00:59:09.173957 2097 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 10 00:59:09.340000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:59:09.341000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7325 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:59:09.340000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00ebb88e0 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 00:59:09.340000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 00:59:09.341000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00c544db0 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 00:59:09.341000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 00:59:09.342000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:59:09.342000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00c544de0 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 00:59:09.342000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 00:59:09.353000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7319 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:59:09.353000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00c8e77d0 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 00:59:09.353000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 00:59:09.372000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:59:09.372000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00c544f00 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 00:59:09.372000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 00:59:09.372000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:59:09.372000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00eff81e0 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 00:59:09.372000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 00:59:09.938913 env[1248]: time="2025-07-10T00:59:09.938882175Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:09.940105 env[1248]: time="2025-07-10T00:59:09.940092439Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7fd1cc652979d89a51bbcc125e28e90c9815c0bd8f922a5bd36eed4e1927c6d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:09.942341 env[1248]: time="2025-07-10T00:59:09.940938997Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:09.943256 env[1248]: time="2025-07-10T00:59:09.943244778Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e570128aa8067a2f06b96d3cc98afa2e0a4b9790b435ee36ca051c8e72aeb8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:09.943541 env[1248]: time="2025-07-10T00:59:09.943506762Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\" returns image reference \"sha256:c7fd1cc652979d89a51bbcc125e28e90c9815c0bd8f922a5bd36eed4e1927c6d\"" Jul 10 00:59:09.944670 env[1248]: time="2025-07-10T00:59:09.944657425Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.2\"" Jul 10 00:59:09.947796 env[1248]: time="2025-07-10T00:59:09.947758422Z" level=info msg="CreateContainer within sandbox \"9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 10 00:59:09.958250 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3029682334.mount: Deactivated successfully. Jul 10 00:59:09.964813 env[1248]: time="2025-07-10T00:59:09.964779260Z" level=info msg="CreateContainer within sandbox \"9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"43025d69bab435f0e04d2c17ccb92323b95c6ea9b0da873ee6ebe83a68e2a52d\"" Jul 10 00:59:09.966062 env[1248]: time="2025-07-10T00:59:09.965256927Z" level=info msg="StartContainer for \"43025d69bab435f0e04d2c17ccb92323b95c6ea9b0da873ee6ebe83a68e2a52d\"" Jul 10 00:59:09.984526 systemd[1]: Started cri-containerd-43025d69bab435f0e04d2c17ccb92323b95c6ea9b0da873ee6ebe83a68e2a52d.scope. Jul 10 00:59:10.005000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.005000 audit[4676]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fb4da8ef2f8 items=0 ppid=4061 pid=4676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:10.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433303235643639626162343335663065303464326331376363623932 Jul 10 00:59:10.005000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.005000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.005000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.005000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.005000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.005000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.005000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.005000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.005000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.005000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.005000 audit: BPF prog-id=221 op=LOAD Jul 10 00:59:10.005000 audit[4676]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000024468 items=0 ppid=4061 pid=4676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:10.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433303235643639626162343335663065303464326331376363623932 Jul 10 00:59:10.005000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.005000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.005000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.005000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.005000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.005000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.005000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.005000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.005000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.005000 audit: BPF prog-id=222 op=LOAD Jul 10 00:59:10.005000 audit[4676]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0000244b8 items=0 ppid=4061 pid=4676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:10.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433303235643639626162343335663065303464326331376363623932 Jul 10 00:59:10.006000 audit: BPF prog-id=222 op=UNLOAD Jul 10 00:59:10.006000 audit: BPF prog-id=221 op=UNLOAD Jul 10 00:59:10.006000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.006000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.006000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.006000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.006000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.006000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.006000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.006000 audit[4676]: AVC avc: denied { perfmon } for pid=4676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.006000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.006000 audit[4676]: AVC avc: denied { bpf } for pid=4676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.006000 audit: BPF prog-id=223 op=LOAD Jul 10 00:59:10.006000 audit[4676]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000024548 items=0 ppid=4061 pid=4676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:10.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433303235643639626162343335663065303464326331376363623932 Jul 10 00:59:10.020486 env[1248]: time="2025-07-10T00:59:10.020458757Z" level=info msg="StartContainer for \"43025d69bab435f0e04d2c17ccb92323b95c6ea9b0da873ee6ebe83a68e2a52d\" returns successfully" Jul 10 00:59:10.343359 env[1248]: time="2025-07-10T00:59:10.341241592Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:10.343709 env[1248]: time="2025-07-10T00:59:10.343172889Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.2\" returns image reference \"sha256:5509118eed617ef04ca00f5a095bfd0a4cd1cf69edcfcf9bedf0edb641be51dd\"" Jul 10 00:59:10.343913 env[1248]: time="2025-07-10T00:59:10.343901373Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5509118eed617ef04ca00f5a095bfd0a4cd1cf69edcfcf9bedf0edb641be51dd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:10.344348 env[1248]: time="2025-07-10T00:59:10.344257346Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:10.344910 env[1248]: time="2025-07-10T00:59:10.344898243Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ec6b10660962e7caad70c47755049fad68f9fc2f7064e8bc7cb862583e02cc2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:10.345782 env[1248]: time="2025-07-10T00:59:10.345314249Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.2\"" Jul 10 00:59:10.347278 env[1248]: time="2025-07-10T00:59:10.347263036Z" level=info msg="CreateContainer within sandbox \"4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 10 00:59:10.358856 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3455243713.mount: Deactivated successfully. Jul 10 00:59:10.360366 env[1248]: time="2025-07-10T00:59:10.360309903Z" level=info msg="CreateContainer within sandbox \"4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"3ca7b7f9a933d209cc0f114a7f26886bafcbfc6e7ed6234152fd189069c6f46a\"" Jul 10 00:59:10.361664 env[1248]: time="2025-07-10T00:59:10.361555834Z" level=info msg="StartContainer for \"3ca7b7f9a933d209cc0f114a7f26886bafcbfc6e7ed6234152fd189069c6f46a\"" Jul 10 00:59:10.375740 systemd[1]: Started cri-containerd-3ca7b7f9a933d209cc0f114a7f26886bafcbfc6e7ed6234152fd189069c6f46a.scope. Jul 10 00:59:10.381444 systemd[1]: run-containerd-runc-k8s.io-3ca7b7f9a933d209cc0f114a7f26886bafcbfc6e7ed6234152fd189069c6f46a-runc.XYBXrt.mount: Deactivated successfully. Jul 10 00:59:10.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.391000 audit: BPF prog-id=224 op=LOAD Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { bpf } for pid=4710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4277 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:10.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363613762376639613933336432303963633066313134613766323638 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { perfmon } for pid=4710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4277 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:10.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363613762376639613933336432303963633066313134613766323638 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { bpf } for pid=4710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { bpf } for pid=4710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { bpf } for pid=4710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { perfmon } for pid=4710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { perfmon } for pid=4710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { perfmon } for pid=4710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { perfmon } for pid=4710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { perfmon } for pid=4710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { bpf } for pid=4710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { bpf } for pid=4710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit: BPF prog-id=225 op=LOAD Jul 10 00:59:10.392000 audit[4710]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028f760 items=0 ppid=4277 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:10.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363613762376639613933336432303963633066313134613766323638 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { bpf } for pid=4710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { bpf } for pid=4710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { perfmon } for pid=4710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { perfmon } for pid=4710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { perfmon } for pid=4710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { perfmon } for pid=4710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { perfmon } for pid=4710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { bpf } for pid=4710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { bpf } for pid=4710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit: BPF prog-id=226 op=LOAD Jul 10 00:59:10.392000 audit[4710]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028f7a8 items=0 ppid=4277 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:10.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363613762376639613933336432303963633066313134613766323638 Jul 10 00:59:10.392000 audit: BPF prog-id=226 op=UNLOAD Jul 10 00:59:10.392000 audit: BPF prog-id=225 op=UNLOAD Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { bpf } for pid=4710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { bpf } for pid=4710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { bpf } for pid=4710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { perfmon } for pid=4710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { perfmon } for pid=4710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { perfmon } for pid=4710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { perfmon } for pid=4710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { perfmon } for pid=4710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { bpf } for pid=4710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit[4710]: AVC avc: denied { bpf } for pid=4710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:10.392000 audit: BPF prog-id=227 op=LOAD Jul 10 00:59:10.392000 audit[4710]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028fbb8 items=0 ppid=4277 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:10.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363613762376639613933336432303963633066313134613766323638 Jul 10 00:59:10.415291 env[1248]: time="2025-07-10T00:59:10.415268288Z" level=info msg="StartContainer for \"3ca7b7f9a933d209cc0f114a7f26886bafcbfc6e7ed6234152fd189069c6f46a\" returns successfully" Jul 10 00:59:10.471514 systemd[1]: Started sshd@9-139.178.70.109:22-14.103.115.212:56092.service. Jul 10 00:59:10.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.109:22-14.103.115.212:56092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:59:11.231225 kubelet[2097]: I0710 00:59:11.225209 2097 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-8555b5848b-wn4zc" podStartSLOduration=35.596872257 podStartE2EDuration="44.218061004s" podCreationTimestamp="2025-07-10 00:58:27 +0000 UTC" firstStartedPulling="2025-07-10 00:58:59.250669711 +0000 UTC m=+47.000067365" lastFinishedPulling="2025-07-10 00:59:07.87185846 +0000 UTC m=+55.621256112" observedRunningTime="2025-07-10 00:59:08.199206105 +0000 UTC m=+55.948603767" watchObservedRunningTime="2025-07-10 00:59:11.218061004 +0000 UTC m=+58.967458659" Jul 10 00:59:11.255000 audit[4749]: NETFILTER_CFG table=filter:124 family=2 entries=12 op=nft_register_rule pid=4749 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:11.255000 audit[4749]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe3dc6a6c0 a2=0 a3=7ffe3dc6a6ac items=0 ppid=2201 pid=4749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:11.255000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:11.260000 audit[4749]: NETFILTER_CFG table=nat:125 family=2 entries=22 op=nft_register_rule pid=4749 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:11.260000 audit[4749]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe3dc6a6c0 a2=0 a3=7ffe3dc6a6ac items=0 ppid=2201 pid=4749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:11.260000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:11.327000 audit[4721]: AVC avc: denied { watch } for pid=4721 comm="apiserver" path="/calico-apiserver-certs/..2025_07_10_00_58_42.3409322352/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c17,c118 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c17,c118 tclass=file permissive=0 Jul 10 00:59:11.327000 audit[4721]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b0bd40 a2=fc6 a3=0 items=0 ppid=4277 pid=4721 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c17,c118 key=(null) Jul 10 00:59:11.327000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 10 00:59:13.563260 sshd[4745]: Invalid user user from 14.103.115.212 port 56092 Jul 10 00:59:13.615396 sshd[4745]: pam_faillock(sshd:auth): User unknown Jul 10 00:59:13.678095 kernel: kauditd_printk_skb: 190 callbacks suppressed Jul 10 00:59:13.716296 kernel: audit: type=1100 audit(1752109153.622:1437): pid=4745 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user" exe="/usr/sbin/sshd" hostname=14.103.115.212 addr=14.103.115.212 terminal=ssh res=failed' Jul 10 00:59:13.622000 audit[4745]: USER_AUTH pid=4745 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user" exe="/usr/sbin/sshd" hostname=14.103.115.212 addr=14.103.115.212 terminal=ssh res=failed' Jul 10 00:59:13.623225 sshd[4745]: pam_unix(sshd:auth): check pass; user unknown Jul 10 00:59:13.623267 sshd[4745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.103.115.212 Jul 10 00:59:13.623626 sshd[4745]: pam_faillock(sshd:auth): User unknown Jul 10 00:59:13.796870 kubelet[2097]: I0710 00:59:13.793317 2097 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 10 00:59:13.808676 kubelet[2097]: E0710 00:59:13.808661 2097 kubelet.go:2573] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.208s" Jul 10 00:59:13.830508 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount782012307.mount: Deactivated successfully. Jul 10 00:59:13.853408 env[1248]: time="2025-07-10T00:59:13.853136525Z" level=info msg="StopPodSandbox for \"b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da\"" Jul 10 00:59:14.395000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:59:14.495130 kernel: audit: type=1400 audit(1752109154.395:1438): avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:59:14.503007 kernel: audit: type=1400 audit(1752109154.395:1439): avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:59:14.509093 kernel: audit: type=1300 audit(1752109154.395:1438): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013bccc0 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 00:59:14.520134 kernel: audit: type=1327 audit(1752109154.395:1438): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 00:59:14.520172 kernel: audit: type=1300 audit(1752109154.395:1439): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c000ab8160 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 00:59:14.520482 kernel: audit: type=1327 audit(1752109154.395:1439): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 00:59:14.395000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:59:14.395000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013bccc0 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 00:59:14.625188 kernel: audit: type=1400 audit(1752109154.519:1440): avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:59:14.625311 kernel: audit: type=1300 audit(1752109154.519:1440): arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c0013bcd20 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 00:59:14.628212 kernel: audit: type=1327 audit(1752109154.519:1440): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 00:59:14.395000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 00:59:14.395000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c000ab8160 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 00:59:14.395000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 00:59:14.519000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:59:14.519000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c0013bcd20 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 00:59:14.519000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 00:59:14.553000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 00:59:14.553000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013bcd40 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 00:59:14.553000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 00:59:14.835974 env[1248]: time="2025-07-10T00:59:14.835320804Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/goldmane:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:14.844992 env[1248]: time="2025-07-10T00:59:14.837419888Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dc4ea8b409b85d2f118bb4677ad3d34b57e7b01d488c9f019f7073bb58b2162b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:14.844992 env[1248]: time="2025-07-10T00:59:14.838941398Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/goldmane:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:14.844992 env[1248]: time="2025-07-10T00:59:14.841424333Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/goldmane@sha256:a2b761fd93d824431ad93e59e8e670cdf00b478f4b532145297e1e67f2768305,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:14.844992 env[1248]: time="2025-07-10T00:59:14.841596736Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.2\" returns image reference \"sha256:dc4ea8b409b85d2f118bb4677ad3d34b57e7b01d488c9f019f7073bb58b2162b\"" Jul 10 00:59:15.324461 env[1248]: time="2025-07-10T00:59:15.324422078Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.2\"" Jul 10 00:59:15.420030 env[1248]: time="2025-07-10T00:59:15.419998530Z" level=info msg="CreateContainer within sandbox \"bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d\" for container &ContainerMetadata{Name:goldmane,Attempt:0,}" Jul 10 00:59:15.455819 env[1248]: time="2025-07-10T00:59:15.455501903Z" level=info msg="CreateContainer within sandbox \"bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d\" for &ContainerMetadata{Name:goldmane,Attempt:0,} returns container id \"43baae38fde8959029f4a4ed2b5e8e9d1db5126c498892382179bddb7a08b550\"" Jul 10 00:59:15.476513 env[1248]: time="2025-07-10T00:59:15.476476442Z" level=info msg="StartContainer for \"43baae38fde8959029f4a4ed2b5e8e9d1db5126c498892382179bddb7a08b550\"" Jul 10 00:59:15.615952 systemd[1]: Started cri-containerd-43baae38fde8959029f4a4ed2b5e8e9d1db5126c498892382179bddb7a08b550.scope. Jul 10 00:59:15.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit: BPF prog-id=228 op=LOAD Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4339 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:15.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433626161653338666465383935393032396634613465643262356538 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4339 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:15.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433626161653338666465383935393032396634613465643262356538 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit: BPF prog-id=229 op=LOAD Jul 10 00:59:15.641000 audit[4786]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00038d6f0 items=0 ppid=4339 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:15.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433626161653338666465383935393032396634613465643262356538 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit: BPF prog-id=230 op=LOAD Jul 10 00:59:15.641000 audit[4786]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00038d738 items=0 ppid=4339 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:15.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433626161653338666465383935393032396634613465643262356538 Jul 10 00:59:15.641000 audit: BPF prog-id=230 op=UNLOAD Jul 10 00:59:15.641000 audit: BPF prog-id=229 op=UNLOAD Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.641000 audit: BPF prog-id=231 op=LOAD Jul 10 00:59:15.641000 audit[4786]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00038db48 items=0 ppid=4339 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:15.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433626161653338666465383935393032396634613465643262356538 Jul 10 00:59:15.721656 env[1248]: time="2025-07-10T00:59:15.669929682Z" level=info msg="StartContainer for \"43baae38fde8959029f4a4ed2b5e8e9d1db5126c498892382179bddb7a08b550\" returns successfully" Jul 10 00:59:15.828594 env[1248]: time="2025-07-10T00:59:15.828563444Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:15.830719 env[1248]: time="2025-07-10T00:59:15.830599331Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5509118eed617ef04ca00f5a095bfd0a4cd1cf69edcfcf9bedf0edb641be51dd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:15.833851 env[1248]: time="2025-07-10T00:59:15.833830055Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:15.835016 env[1248]: time="2025-07-10T00:59:15.835000054Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ec6b10660962e7caad70c47755049fad68f9fc2f7064e8bc7cb862583e02cc2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:15.835808 env[1248]: time="2025-07-10T00:59:15.835788370Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.2\" returns image reference \"sha256:5509118eed617ef04ca00f5a095bfd0a4cd1cf69edcfcf9bedf0edb641be51dd\"" Jul 10 00:59:15.837924 env[1248]: time="2025-07-10T00:59:15.837905370Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\"" Jul 10 00:59:15.838821 env[1248]: time="2025-07-10T00:59:15.838802793Z" level=info msg="CreateContainer within sandbox \"58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 10 00:59:15.845989 env[1248]: 2025-07-10 00:59:15.100 [WARNING][4762] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--d6d57-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"1b07da51-61a4-4653-83cd-4b8b69b6c8c0", ResourceVersion:"1029", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd", Pod:"coredns-668d6bf9bc-d6d57", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7f23319bf9e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:59:15.845989 env[1248]: 2025-07-10 00:59:15.120 [INFO][4762] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" Jul 10 00:59:15.845989 env[1248]: 2025-07-10 00:59:15.120 [INFO][4762] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" iface="eth0" netns="" Jul 10 00:59:15.845989 env[1248]: 2025-07-10 00:59:15.127 [INFO][4762] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" Jul 10 00:59:15.845989 env[1248]: 2025-07-10 00:59:15.127 [INFO][4762] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" Jul 10 00:59:15.845989 env[1248]: 2025-07-10 00:59:15.769 [INFO][4775] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" HandleID="k8s-pod-network.b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" Workload="localhost-k8s-coredns--668d6bf9bc--d6d57-eth0" Jul 10 00:59:15.845989 env[1248]: 2025-07-10 00:59:15.773 [INFO][4775] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:59:15.845989 env[1248]: 2025-07-10 00:59:15.773 [INFO][4775] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:59:15.845989 env[1248]: 2025-07-10 00:59:15.830 [WARNING][4775] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" HandleID="k8s-pod-network.b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" Workload="localhost-k8s-coredns--668d6bf9bc--d6d57-eth0" Jul 10 00:59:15.845989 env[1248]: 2025-07-10 00:59:15.830 [INFO][4775] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" HandleID="k8s-pod-network.b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" Workload="localhost-k8s-coredns--668d6bf9bc--d6d57-eth0" Jul 10 00:59:15.845989 env[1248]: 2025-07-10 00:59:15.840 [INFO][4775] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:59:15.845989 env[1248]: 2025-07-10 00:59:15.842 [INFO][4762] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" Jul 10 00:59:15.858444 env[1248]: time="2025-07-10T00:59:15.846012891Z" level=info msg="TearDown network for sandbox \"b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da\" successfully" Jul 10 00:59:15.858444 env[1248]: time="2025-07-10T00:59:15.846028179Z" level=info msg="StopPodSandbox for \"b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da\" returns successfully" Jul 10 00:59:15.858444 env[1248]: time="2025-07-10T00:59:15.858398092Z" level=info msg="CreateContainer within sandbox \"58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"a4124f167ef32428fc7c8ae89608ca57236eb60a85d3f8458f5afdb67df965ff\"" Jul 10 00:59:15.859633 env[1248]: time="2025-07-10T00:59:15.859300710Z" level=info msg="StartContainer for \"a4124f167ef32428fc7c8ae89608ca57236eb60a85d3f8458f5afdb67df965ff\"" Jul 10 00:59:15.870184 env[1248]: time="2025-07-10T00:59:15.868509774Z" level=info msg="RemovePodSandbox for \"b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da\"" Jul 10 00:59:15.870184 env[1248]: time="2025-07-10T00:59:15.869422994Z" level=info msg="Forcibly stopping sandbox \"b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da\"" Jul 10 00:59:15.874197 systemd[1]: Started cri-containerd-a4124f167ef32428fc7c8ae89608ca57236eb60a85d3f8458f5afdb67df965ff.scope. Jul 10 00:59:15.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.889000 audit: BPF prog-id=232 op=LOAD Jul 10 00:59:15.889000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.889000 audit[4823]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4413 pid=4823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:15.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134313234663136376566333234323866633763386165383936303863 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4413 pid=4823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:15.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134313234663136376566333234323866633763386165383936303863 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit: BPF prog-id=233 op=LOAD Jul 10 00:59:15.890000 audit[4823]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032fef0 items=0 ppid=4413 pid=4823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:15.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134313234663136376566333234323866633763386165383936303863 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit: BPF prog-id=234 op=LOAD Jul 10 00:59:15.890000 audit[4823]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032ff38 items=0 ppid=4413 pid=4823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:15.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134313234663136376566333234323866633763386165383936303863 Jul 10 00:59:15.890000 audit: BPF prog-id=234 op=UNLOAD Jul 10 00:59:15.890000 audit: BPF prog-id=233 op=UNLOAD Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:15.890000 audit: BPF prog-id=235 op=LOAD Jul 10 00:59:15.890000 audit[4823]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00039a348 items=0 ppid=4413 pid=4823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:15.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134313234663136376566333234323866633763386165383936303863 Jul 10 00:59:15.913392 env[1248]: time="2025-07-10T00:59:15.913367506Z" level=info msg="StartContainer for \"a4124f167ef32428fc7c8ae89608ca57236eb60a85d3f8458f5afdb67df965ff\" returns successfully" Jul 10 00:59:16.096367 sshd[4745]: Failed password for invalid user user from 14.103.115.212 port 56092 ssh2 Jul 10 00:59:16.471044 systemd[1]: run-containerd-runc-k8s.io-43baae38fde8959029f4a4ed2b5e8e9d1db5126c498892382179bddb7a08b550-runc.JmAtWj.mount: Deactivated successfully. Jul 10 00:59:16.897834 env[1248]: 2025-07-10 00:59:16.191 [WARNING][4856] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--d6d57-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"1b07da51-61a4-4653-83cd-4b8b69b6c8c0", ResourceVersion:"1029", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e481a5c3edb0ecbce1e97d0c9865c4c87c7d11fdc2b4da3ea78dab0d1e0aefbd", Pod:"coredns-668d6bf9bc-d6d57", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7f23319bf9e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:59:16.897834 env[1248]: 2025-07-10 00:59:16.199 [INFO][4856] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" Jul 10 00:59:16.897834 env[1248]: 2025-07-10 00:59:16.199 [INFO][4856] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" iface="eth0" netns="" Jul 10 00:59:16.897834 env[1248]: 2025-07-10 00:59:16.199 [INFO][4856] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" Jul 10 00:59:16.897834 env[1248]: 2025-07-10 00:59:16.199 [INFO][4856] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" Jul 10 00:59:16.897834 env[1248]: 2025-07-10 00:59:16.802 [INFO][4873] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" HandleID="k8s-pod-network.b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" Workload="localhost-k8s-coredns--668d6bf9bc--d6d57-eth0" Jul 10 00:59:16.897834 env[1248]: 2025-07-10 00:59:16.836 [INFO][4873] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:59:16.897834 env[1248]: 2025-07-10 00:59:16.849 [INFO][4873] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:59:16.897834 env[1248]: 2025-07-10 00:59:16.878 [WARNING][4873] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" HandleID="k8s-pod-network.b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" Workload="localhost-k8s-coredns--668d6bf9bc--d6d57-eth0" Jul 10 00:59:16.897834 env[1248]: 2025-07-10 00:59:16.879 [INFO][4873] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" HandleID="k8s-pod-network.b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" Workload="localhost-k8s-coredns--668d6bf9bc--d6d57-eth0" Jul 10 00:59:16.897834 env[1248]: 2025-07-10 00:59:16.880 [INFO][4873] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:59:16.897834 env[1248]: 2025-07-10 00:59:16.888 [INFO][4856] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da" Jul 10 00:59:16.928102 env[1248]: time="2025-07-10T00:59:16.898012290Z" level=info msg="TearDown network for sandbox \"b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da\" successfully" Jul 10 00:59:16.928102 env[1248]: time="2025-07-10T00:59:16.907666454Z" level=info msg="RemovePodSandbox \"b9fe822ada5102ebc716a436f43547303103eaf66998557423fe9a3ec45386da\" returns successfully" Jul 10 00:59:17.222277 env[1248]: time="2025-07-10T00:59:17.222049109Z" level=info msg="StopPodSandbox for \"ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e\"" Jul 10 00:59:17.807523 sshd[4745]: Received disconnect from 14.103.115.212 port 56092:11: Bye Bye [preauth] Jul 10 00:59:17.900753 sshd[4745]: Disconnected from invalid user user 14.103.115.212 port 56092 [preauth] Jul 10 00:59:17.898614 systemd[1]: sshd@9-139.178.70.109:22-14.103.115.212:56092.service: Deactivated successfully. Jul 10 00:59:17.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.109:22-14.103.115.212:56092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:59:18.266293 kubelet[2097]: I0710 00:59:17.889084 2097 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6765fdc8c8-5kgrr" podStartSLOduration=40.877860327 podStartE2EDuration="50.798136336s" podCreationTimestamp="2025-07-10 00:58:27 +0000 UTC" firstStartedPulling="2025-07-10 00:59:00.424811602 +0000 UTC m=+48.174209256" lastFinishedPulling="2025-07-10 00:59:10.345087612 +0000 UTC m=+58.094485265" observedRunningTime="2025-07-10 00:59:11.231667339 +0000 UTC m=+58.981064992" watchObservedRunningTime="2025-07-10 00:59:17.798136336 +0000 UTC m=+65.547533989" Jul 10 00:59:18.414112 kubelet[2097]: I0710 00:59:18.266647 2097 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/goldmane-768f4c5c69-6bh96" podStartSLOduration=34.676027322 podStartE2EDuration="49.26663003s" podCreationTimestamp="2025-07-10 00:58:29 +0000 UTC" firstStartedPulling="2025-07-10 00:59:00.684403909 +0000 UTC m=+48.433801562" lastFinishedPulling="2025-07-10 00:59:15.275006618 +0000 UTC m=+63.024404270" observedRunningTime="2025-07-10 00:59:17.608863045 +0000 UTC m=+65.358260700" watchObservedRunningTime="2025-07-10 00:59:18.26663003 +0000 UTC m=+66.016027690" Jul 10 00:59:18.764357 kernel: kauditd_printk_skb: 118 callbacks suppressed Jul 10 00:59:18.786710 kernel: audit: type=1325 audit(1752109158.760:1479): table=filter:126 family=2 entries=12 op=nft_register_rule pid=4940 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:18.794615 kernel: audit: type=1300 audit(1752109158.760:1479): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fffc0cd0c60 a2=0 a3=7fffc0cd0c4c items=0 ppid=2201 pid=4940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:18.794664 kernel: audit: type=1327 audit(1752109158.760:1479): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:18.794683 kernel: audit: type=1325 audit(1752109158.773:1480): table=nat:127 family=2 entries=22 op=nft_register_rule pid=4940 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:18.794702 kernel: audit: type=1300 audit(1752109158.773:1480): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffc0cd0c60 a2=0 a3=7fffc0cd0c4c items=0 ppid=2201 pid=4940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:18.794720 kernel: audit: type=1327 audit(1752109158.773:1480): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:18.760000 audit[4940]: NETFILTER_CFG table=filter:126 family=2 entries=12 op=nft_register_rule pid=4940 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:18.760000 audit[4940]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fffc0cd0c60 a2=0 a3=7fffc0cd0c4c items=0 ppid=2201 pid=4940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:18.760000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:18.773000 audit[4940]: NETFILTER_CFG table=nat:127 family=2 entries=22 op=nft_register_rule pid=4940 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:18.773000 audit[4940]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffc0cd0c60 a2=0 a3=7fffc0cd0c4c items=0 ppid=2201 pid=4940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:18.773000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:18.962000 audit[4942]: NETFILTER_CFG table=filter:128 family=2 entries=12 op=nft_register_rule pid=4942 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:18.969750 kernel: audit: type=1325 audit(1752109158.962:1481): table=filter:128 family=2 entries=12 op=nft_register_rule pid=4942 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:18.971544 kernel: audit: type=1300 audit(1752109158.962:1481): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc8196bc60 a2=0 a3=7ffc8196bc4c items=0 ppid=2201 pid=4942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:18.971573 kernel: audit: type=1327 audit(1752109158.962:1481): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:18.962000 audit[4942]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc8196bc60 a2=0 a3=7ffc8196bc4c items=0 ppid=2201 pid=4942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:18.962000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:18.974000 audit[4942]: NETFILTER_CFG table=nat:129 family=2 entries=22 op=nft_register_rule pid=4942 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:18.978499 kernel: audit: type=1325 audit(1752109158.974:1482): table=nat:129 family=2 entries=22 op=nft_register_rule pid=4942 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:18.974000 audit[4942]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc8196bc60 a2=0 a3=7ffc8196bc4c items=0 ppid=2201 pid=4942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:18.974000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:19.261910 env[1248]: time="2025-07-10T00:59:19.261879980Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:19.282238 env[1248]: time="2025-07-10T00:59:19.266868407Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9e48822a4fe26f4ed9231b361fdd1357ea3567f1fc0a8db4d616622fe570a866,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:19.282238 env[1248]: time="2025-07-10T00:59:19.271007590Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:19.282238 env[1248]: time="2025-07-10T00:59:19.273791770Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\" returns image reference \"sha256:9e48822a4fe26f4ed9231b361fdd1357ea3567f1fc0a8db4d616622fe570a866\"" Jul 10 00:59:19.282238 env[1248]: time="2025-07-10T00:59:19.274000559Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:8fec2de12dfa51bae89d941938a07af2598eb8bfcab55d0dded1d9c193d7b99f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:59:19.939797 env[1248]: 2025-07-10 00:59:19.384 [WARNING][4913] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--4vdxb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"100cec77-b0fb-436f-a956-a4a5a994a411", ResourceVersion:"987", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1", Pod:"csi-node-driver-4vdxb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali97467c81b48", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:59:19.939797 env[1248]: 2025-07-10 00:59:19.402 [INFO][4913] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" Jul 10 00:59:19.939797 env[1248]: 2025-07-10 00:59:19.404 [INFO][4913] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" iface="eth0" netns="" Jul 10 00:59:19.939797 env[1248]: 2025-07-10 00:59:19.404 [INFO][4913] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" Jul 10 00:59:19.939797 env[1248]: 2025-07-10 00:59:19.404 [INFO][4913] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" Jul 10 00:59:19.939797 env[1248]: 2025-07-10 00:59:19.885 [INFO][4950] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" HandleID="k8s-pod-network.ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" Workload="localhost-k8s-csi--node--driver--4vdxb-eth0" Jul 10 00:59:19.939797 env[1248]: 2025-07-10 00:59:19.890 [INFO][4950] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:59:19.939797 env[1248]: 2025-07-10 00:59:19.890 [INFO][4950] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:59:19.939797 env[1248]: 2025-07-10 00:59:19.925 [WARNING][4950] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" HandleID="k8s-pod-network.ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" Workload="localhost-k8s-csi--node--driver--4vdxb-eth0" Jul 10 00:59:19.939797 env[1248]: 2025-07-10 00:59:19.925 [INFO][4950] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" HandleID="k8s-pod-network.ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" Workload="localhost-k8s-csi--node--driver--4vdxb-eth0" Jul 10 00:59:19.939797 env[1248]: 2025-07-10 00:59:19.926 [INFO][4950] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:59:19.939797 env[1248]: 2025-07-10 00:59:19.930 [INFO][4913] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" Jul 10 00:59:19.970657 env[1248]: time="2025-07-10T00:59:19.939892956Z" level=info msg="TearDown network for sandbox \"ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e\" successfully" Jul 10 00:59:19.970657 env[1248]: time="2025-07-10T00:59:19.939914082Z" level=info msg="StopPodSandbox for \"ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e\" returns successfully" Jul 10 00:59:20.361560 env[1248]: time="2025-07-10T00:59:20.361451894Z" level=info msg="RemovePodSandbox for \"ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e\"" Jul 10 00:59:20.361560 env[1248]: time="2025-07-10T00:59:20.361482286Z" level=info msg="Forcibly stopping sandbox \"ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e\"" Jul 10 00:59:20.878000 audit[4837]: AVC avc: denied { watch } for pid=4837 comm="apiserver" path="/calico-apiserver-certs/..2025_07_10_00_58_42.1504779381/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c175 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c39,c175 tclass=file permissive=0 Jul 10 00:59:20.878000 audit[4837]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0008ee280 a2=fc6 a3=0 items=0 ppid=4413 pid=4837 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c175 key=(null) Jul 10 00:59:20.878000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 10 00:59:21.315882 kubelet[2097]: E0710 00:59:21.315516 2097 kubelet.go:2573] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="2.113s" Jul 10 00:59:21.395117 kubelet[2097]: I0710 00:59:21.174976 2097 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6765fdc8c8-2wnxd" podStartSLOduration=38.890592513 podStartE2EDuration="53.991298967s" podCreationTimestamp="2025-07-10 00:58:27 +0000 UTC" firstStartedPulling="2025-07-10 00:59:00.735724748 +0000 UTC m=+48.485122399" lastFinishedPulling="2025-07-10 00:59:15.836431198 +0000 UTC m=+63.585828853" observedRunningTime="2025-07-10 00:59:20.87962441 +0000 UTC m=+68.629022068" watchObservedRunningTime="2025-07-10 00:59:20.991298967 +0000 UTC m=+68.740696621" Jul 10 00:59:21.554323 env[1248]: 2025-07-10 00:59:21.136 [WARNING][4965] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--4vdxb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"100cec77-b0fb-436f-a956-a4a5a994a411", ResourceVersion:"987", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1", Pod:"csi-node-driver-4vdxb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali97467c81b48", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:59:21.554323 env[1248]: 2025-07-10 00:59:21.138 [INFO][4965] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" Jul 10 00:59:21.554323 env[1248]: 2025-07-10 00:59:21.138 [INFO][4965] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" iface="eth0" netns="" Jul 10 00:59:21.554323 env[1248]: 2025-07-10 00:59:21.138 [INFO][4965] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" Jul 10 00:59:21.554323 env[1248]: 2025-07-10 00:59:21.138 [INFO][4965] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" Jul 10 00:59:21.554323 env[1248]: 2025-07-10 00:59:21.487 [INFO][4977] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" HandleID="k8s-pod-network.ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" Workload="localhost-k8s-csi--node--driver--4vdxb-eth0" Jul 10 00:59:21.554323 env[1248]: 2025-07-10 00:59:21.508 [INFO][4977] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:59:21.554323 env[1248]: 2025-07-10 00:59:21.517 [INFO][4977] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:59:21.554323 env[1248]: 2025-07-10 00:59:21.544 [WARNING][4977] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" HandleID="k8s-pod-network.ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" Workload="localhost-k8s-csi--node--driver--4vdxb-eth0" Jul 10 00:59:21.554323 env[1248]: 2025-07-10 00:59:21.544 [INFO][4977] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" HandleID="k8s-pod-network.ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" Workload="localhost-k8s-csi--node--driver--4vdxb-eth0" Jul 10 00:59:21.554323 env[1248]: 2025-07-10 00:59:21.546 [INFO][4977] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:59:21.554323 env[1248]: 2025-07-10 00:59:21.550 [INFO][4965] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e" Jul 10 00:59:21.554323 env[1248]: time="2025-07-10T00:59:21.553800448Z" level=info msg="TearDown network for sandbox \"ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e\" successfully" Jul 10 00:59:21.563529 env[1248]: time="2025-07-10T00:59:21.559389450Z" level=info msg="RemovePodSandbox \"ca068cf3c9d54280a9bf26cafa01d770093ece1b4068b63642b5a47561ea075e\" returns successfully" Jul 10 00:59:21.667973 env[1248]: time="2025-07-10T00:59:21.667727834Z" level=info msg="StopPodSandbox for \"1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2\"" Jul 10 00:59:21.827748 env[1248]: time="2025-07-10T00:59:21.827716695Z" level=info msg="CreateContainer within sandbox \"9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 10 00:59:21.852016 env[1248]: time="2025-07-10T00:59:21.851993170Z" level=info msg="CreateContainer within sandbox \"9fe5c995a4631d00fc4a213bc4cc41800ffa3ac095b57c4f23d4ef0519db54c1\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ee12510fd2b686e71f2373d59241d60596ffa0a21a2a22c16e61ff3e7f66b5f3\"" Jul 10 00:59:21.854238 systemd[1]: run-containerd-runc-k8s.io-472cce3782ba5c8d4f06b781aafe60b07e229675b56e0e7763f7f6f75acee344-runc.Fx9V8f.mount: Deactivated successfully. Jul 10 00:59:21.913038 env[1248]: time="2025-07-10T00:59:21.913013648Z" level=info msg="StartContainer for \"ee12510fd2b686e71f2373d59241d60596ffa0a21a2a22c16e61ff3e7f66b5f3\"" Jul 10 00:59:22.015252 systemd[1]: Started cri-containerd-ee12510fd2b686e71f2373d59241d60596ffa0a21a2a22c16e61ff3e7f66b5f3.scope. Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f2f8c922448 items=0 ppid=4061 pid=5039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:22.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565313235313066643262363836653731663233373364353932343164 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit: BPF prog-id=236 op=LOAD Jul 10 00:59:22.029000 audit[5039]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0002a0208 items=0 ppid=4061 pid=5039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:22.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565313235313066643262363836653731663233373364353932343164 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit: BPF prog-id=237 op=LOAD Jul 10 00:59:22.029000 audit[5039]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0002a0258 items=0 ppid=4061 pid=5039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:22.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565313235313066643262363836653731663233373364353932343164 Jul 10 00:59:22.029000 audit: BPF prog-id=237 op=UNLOAD Jul 10 00:59:22.029000 audit: BPF prog-id=236 op=UNLOAD Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:59:22.029000 audit: BPF prog-id=238 op=LOAD Jul 10 00:59:22.029000 audit[5039]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0002a02e8 items=0 ppid=4061 pid=5039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:22.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565313235313066643262363836653731663233373364353932343164 Jul 10 00:59:22.085423 env[1248]: time="2025-07-10T00:59:22.055394487Z" level=info msg="StartContainer for \"ee12510fd2b686e71f2373d59241d60596ffa0a21a2a22c16e61ff3e7f66b5f3\" returns successfully" Jul 10 00:59:22.806378 systemd[1]: run-containerd-runc-k8s.io-ee12510fd2b686e71f2373d59241d60596ffa0a21a2a22c16e61ff3e7f66b5f3-runc.8RslZQ.mount: Deactivated successfully. Jul 10 00:59:23.632000 audit[5082]: NETFILTER_CFG table=filter:130 family=2 entries=11 op=nft_register_rule pid=5082 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:23.632000 audit[5082]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd7ce54720 a2=0 a3=7ffd7ce5470c items=0 ppid=2201 pid=5082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:23.632000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:23.642000 audit[5082]: NETFILTER_CFG table=nat:131 family=2 entries=29 op=nft_register_chain pid=5082 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:23.642000 audit[5082]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7ffd7ce54720 a2=0 a3=7ffd7ce5470c items=0 ppid=2201 pid=5082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:23.642000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:25.082386 kernel: kauditd_printk_skb: 54 callbacks suppressed Jul 10 00:59:25.193150 kernel: audit: type=1325 audit(1752109165.047:1492): table=filter:132 family=2 entries=10 op=nft_register_rule pid=5085 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:25.199799 kernel: audit: type=1300 audit(1752109165.047:1492): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc72aecba0 a2=0 a3=7ffc72aecb8c items=0 ppid=2201 pid=5085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:25.204881 kernel: audit: type=1327 audit(1752109165.047:1492): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:25.209064 kernel: audit: type=1325 audit(1752109165.060:1493): table=nat:133 family=2 entries=32 op=nft_register_rule pid=5085 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:25.209098 kernel: audit: type=1300 audit(1752109165.060:1493): arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7ffc72aecba0 a2=0 a3=7ffc72aecb8c items=0 ppid=2201 pid=5085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:25.209141 kernel: audit: type=1327 audit(1752109165.060:1493): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:25.047000 audit[5085]: NETFILTER_CFG table=filter:132 family=2 entries=10 op=nft_register_rule pid=5085 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:25.047000 audit[5085]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc72aecba0 a2=0 a3=7ffc72aecb8c items=0 ppid=2201 pid=5085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:25.047000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:25.060000 audit[5085]: NETFILTER_CFG table=nat:133 family=2 entries=32 op=nft_register_rule pid=5085 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:25.060000 audit[5085]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7ffc72aecba0 a2=0 a3=7ffc72aecb8c items=0 ppid=2201 pid=5085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:25.060000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:26.118948 env[1248]: 2025-07-10 00:59:23.142 [WARNING][5008] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0", GenerateName:"calico-apiserver-6765fdc8c8-", Namespace:"calico-apiserver", SelfLink:"", UID:"e40791bb-1dd3-4f13-a751-d75795ef4c90", ResourceVersion:"1106", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6765fdc8c8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa", Pod:"calico-apiserver-6765fdc8c8-2wnxd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.137/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0c5a612c4ad", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:59:26.118948 env[1248]: 2025-07-10 00:59:23.239 [INFO][5008] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" Jul 10 00:59:26.118948 env[1248]: 2025-07-10 00:59:23.242 [INFO][5008] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" iface="eth0" netns="" Jul 10 00:59:26.118948 env[1248]: 2025-07-10 00:59:23.246 [INFO][5008] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" Jul 10 00:59:26.118948 env[1248]: 2025-07-10 00:59:23.246 [INFO][5008] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" Jul 10 00:59:26.118948 env[1248]: 2025-07-10 00:59:25.209 [INFO][5075] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" HandleID="k8s-pod-network.1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0" Jul 10 00:59:26.118948 env[1248]: 2025-07-10 00:59:25.253 [INFO][5075] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:59:26.118948 env[1248]: 2025-07-10 00:59:25.254 [INFO][5075] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:59:26.118948 env[1248]: 2025-07-10 00:59:25.879 [WARNING][5075] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" HandleID="k8s-pod-network.1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0" Jul 10 00:59:26.118948 env[1248]: 2025-07-10 00:59:25.911 [INFO][5075] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" HandleID="k8s-pod-network.1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0" Jul 10 00:59:26.118948 env[1248]: 2025-07-10 00:59:25.964 [INFO][5075] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:59:26.118948 env[1248]: 2025-07-10 00:59:26.075 [INFO][5008] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" Jul 10 00:59:26.118948 env[1248]: time="2025-07-10T00:59:26.114984197Z" level=info msg="TearDown network for sandbox \"1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2\" successfully" Jul 10 00:59:26.118948 env[1248]: time="2025-07-10T00:59:26.115004693Z" level=info msg="StopPodSandbox for \"1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2\" returns successfully" Jul 10 00:59:27.789800 env[1248]: time="2025-07-10T00:59:27.789761819Z" level=info msg="RemovePodSandbox for \"1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2\"" Jul 10 00:59:27.892079 env[1248]: time="2025-07-10T00:59:27.789803569Z" level=info msg="Forcibly stopping sandbox \"1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2\"" Jul 10 00:59:28.377585 kubelet[2097]: E0710 00:59:28.321223 2097 kubelet.go:2573] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.111s" Jul 10 00:59:28.993000 audit[5101]: NETFILTER_CFG table=filter:134 family=2 entries=10 op=nft_register_rule pid=5101 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:29.157305 kernel: audit: type=1325 audit(1752109168.993:1494): table=filter:134 family=2 entries=10 op=nft_register_rule pid=5101 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:29.165091 kernel: audit: type=1300 audit(1752109168.993:1494): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd2c40dde0 a2=0 a3=7ffd2c40ddcc items=0 ppid=2201 pid=5101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:29.165137 kernel: audit: type=1327 audit(1752109168.993:1494): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:29.165163 kernel: audit: type=1325 audit(1752109169.004:1495): table=nat:135 family=2 entries=32 op=nft_register_rule pid=5101 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:28.993000 audit[5101]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd2c40dde0 a2=0 a3=7ffd2c40ddcc items=0 ppid=2201 pid=5101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:28.993000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:29.004000 audit[5101]: NETFILTER_CFG table=nat:135 family=2 entries=32 op=nft_register_rule pid=5101 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:59:29.004000 audit[5101]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7ffd2c40dde0 a2=0 a3=7ffd2c40ddcc items=0 ppid=2201 pid=5101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:29.004000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:59:30.715887 env[1248]: 2025-07-10 00:59:29.398 [WARNING][5094] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0", GenerateName:"calico-apiserver-6765fdc8c8-", Namespace:"calico-apiserver", SelfLink:"", UID:"e40791bb-1dd3-4f13-a751-d75795ef4c90", ResourceVersion:"1159", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6765fdc8c8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa", Pod:"calico-apiserver-6765fdc8c8-2wnxd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.137/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0c5a612c4ad", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:59:30.715887 env[1248]: 2025-07-10 00:59:29.451 [INFO][5094] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" Jul 10 00:59:30.715887 env[1248]: 2025-07-10 00:59:29.451 [INFO][5094] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" iface="eth0" netns="" Jul 10 00:59:30.715887 env[1248]: 2025-07-10 00:59:29.451 [INFO][5094] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" Jul 10 00:59:30.715887 env[1248]: 2025-07-10 00:59:29.451 [INFO][5094] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" Jul 10 00:59:30.715887 env[1248]: 2025-07-10 00:59:30.229 [INFO][5106] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" HandleID="k8s-pod-network.1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0" Jul 10 00:59:30.715887 env[1248]: 2025-07-10 00:59:30.287 [INFO][5106] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:59:30.715887 env[1248]: 2025-07-10 00:59:30.295 [INFO][5106] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:59:30.715887 env[1248]: 2025-07-10 00:59:30.512 [WARNING][5106] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" HandleID="k8s-pod-network.1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0" Jul 10 00:59:30.715887 env[1248]: 2025-07-10 00:59:30.512 [INFO][5106] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" HandleID="k8s-pod-network.1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0" Jul 10 00:59:30.715887 env[1248]: 2025-07-10 00:59:30.530 [INFO][5106] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:59:30.715887 env[1248]: 2025-07-10 00:59:30.549 [INFO][5094] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2" Jul 10 00:59:30.715887 env[1248]: time="2025-07-10T00:59:30.715904177Z" level=info msg="TearDown network for sandbox \"1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2\" successfully" Jul 10 00:59:31.225458 env[1248]: time="2025-07-10T00:59:30.899185216Z" level=info msg="RemovePodSandbox \"1bd5d334a995078ce2dbc176e7f4d8d65d43d88784cb33a943f77a7440e079a2\" returns successfully" Jul 10 00:59:32.804895 env[1248]: time="2025-07-10T00:59:32.804658560Z" level=info msg="StopPodSandbox for \"1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901\"" Jul 10 00:59:35.924777 env[1248]: 2025-07-10 00:59:35.153 [WARNING][5123] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0", GenerateName:"calico-apiserver-6765fdc8c8-", Namespace:"calico-apiserver", SelfLink:"", UID:"929acd7b-6935-4495-be2b-b8264653f84a", ResourceVersion:"1082", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6765fdc8c8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd", Pod:"calico-apiserver-6765fdc8c8-5kgrr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9791e28cf41", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:59:35.924777 env[1248]: 2025-07-10 00:59:35.167 [INFO][5123] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" Jul 10 00:59:35.924777 env[1248]: 2025-07-10 00:59:35.169 [INFO][5123] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" iface="eth0" netns="" Jul 10 00:59:35.924777 env[1248]: 2025-07-10 00:59:35.169 [INFO][5123] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" Jul 10 00:59:35.924777 env[1248]: 2025-07-10 00:59:35.169 [INFO][5123] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" Jul 10 00:59:35.924777 env[1248]: 2025-07-10 00:59:35.723 [INFO][5173] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" HandleID="k8s-pod-network.1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0" Jul 10 00:59:35.924777 env[1248]: 2025-07-10 00:59:35.739 [INFO][5173] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:59:35.924777 env[1248]: 2025-07-10 00:59:35.740 [INFO][5173] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:59:35.924777 env[1248]: 2025-07-10 00:59:35.804 [WARNING][5173] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" HandleID="k8s-pod-network.1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0" Jul 10 00:59:35.924777 env[1248]: 2025-07-10 00:59:35.805 [INFO][5173] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" HandleID="k8s-pod-network.1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0" Jul 10 00:59:35.924777 env[1248]: 2025-07-10 00:59:35.806 [INFO][5173] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:59:35.924777 env[1248]: 2025-07-10 00:59:35.818 [INFO][5123] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" Jul 10 00:59:35.924777 env[1248]: time="2025-07-10T00:59:35.903359192Z" level=info msg="TearDown network for sandbox \"1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901\" successfully" Jul 10 00:59:35.924777 env[1248]: time="2025-07-10T00:59:35.903471978Z" level=info msg="StopPodSandbox for \"1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901\" returns successfully" Jul 10 00:59:37.151196 env[1248]: time="2025-07-10T00:59:37.151154617Z" level=info msg="RemovePodSandbox for \"1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901\"" Jul 10 00:59:37.151196 env[1248]: time="2025-07-10T00:59:37.151191758Z" level=info msg="Forcibly stopping sandbox \"1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901\"" Jul 10 00:59:37.820248 kubelet[2097]: E0710 00:59:37.543701 2097 goroutinemap.go:150] Operation for "/var/lib/kubelet/plugins_registry/csi.tigera.io-reg.sock" failed. No retries permitted until 2025-07-10 00:59:37.767126171 +0000 UTC m=+85.516523823 (durationBeforeRetry 500ms). Error: RegisterPlugin error -- failed to get plugin info using RPC GetInfo at socket /var/lib/kubelet/plugins_registry/csi.tigera.io-reg.sock, err: rpc error: code = DeadlineExceeded desc = context deadline exceeded Jul 10 00:59:39.239239 env[1248]: 2025-07-10 00:59:38.320 [WARNING][5187] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0", GenerateName:"calico-apiserver-6765fdc8c8-", Namespace:"calico-apiserver", SelfLink:"", UID:"929acd7b-6935-4495-be2b-b8264653f84a", ResourceVersion:"1082", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6765fdc8c8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd", Pod:"calico-apiserver-6765fdc8c8-5kgrr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9791e28cf41", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:59:39.239239 env[1248]: 2025-07-10 00:59:38.328 [INFO][5187] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" Jul 10 00:59:39.239239 env[1248]: 2025-07-10 00:59:38.328 [INFO][5187] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" iface="eth0" netns="" Jul 10 00:59:39.239239 env[1248]: 2025-07-10 00:59:38.328 [INFO][5187] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" Jul 10 00:59:39.239239 env[1248]: 2025-07-10 00:59:38.328 [INFO][5187] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" Jul 10 00:59:39.239239 env[1248]: 2025-07-10 00:59:39.025 [INFO][5195] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" HandleID="k8s-pod-network.1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0" Jul 10 00:59:39.239239 env[1248]: 2025-07-10 00:59:39.035 [INFO][5195] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:59:39.239239 env[1248]: 2025-07-10 00:59:39.042 [INFO][5195] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:59:39.239239 env[1248]: 2025-07-10 00:59:39.209 [WARNING][5195] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" HandleID="k8s-pod-network.1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0" Jul 10 00:59:39.239239 env[1248]: 2025-07-10 00:59:39.209 [INFO][5195] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" HandleID="k8s-pod-network.1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0" Jul 10 00:59:39.239239 env[1248]: 2025-07-10 00:59:39.211 [INFO][5195] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:59:39.239239 env[1248]: 2025-07-10 00:59:39.219 [INFO][5187] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901" Jul 10 00:59:39.366814 env[1248]: time="2025-07-10T00:59:39.239262093Z" level=info msg="TearDown network for sandbox \"1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901\" successfully" Jul 10 00:59:39.366814 env[1248]: time="2025-07-10T00:59:39.315632785Z" level=info msg="RemovePodSandbox \"1e10b8bea5ed64ae3f2381fe3dbb118e6f050b447b1afa56066d59cb7261e901\" returns successfully" Jul 10 00:59:41.289739 env[1248]: time="2025-07-10T00:59:41.289707361Z" level=info msg="StopPodSandbox for \"dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178\"" Jul 10 00:59:42.055036 systemd[1]: Started sshd@10-139.178.70.109:22-139.178.68.195:40900.service. Jul 10 00:59:42.175091 kernel: kauditd_printk_skb: 2 callbacks suppressed Jul 10 00:59:42.183151 kernel: audit: type=1130 audit(1752109182.060:1496): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.109:22-139.178.68.195:40900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:59:42.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.109:22-139.178.68.195:40900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:59:42.506000 audit[5218]: USER_ACCT pid=5218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:59:42.547451 kernel: audit: type=1101 audit(1752109182.506:1497): pid=5218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:59:42.552788 kernel: audit: type=1103 audit(1752109182.513:1498): pid=5218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:59:42.552820 kernel: audit: type=1006 audit(1752109182.513:1499): pid=5218 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Jul 10 00:59:42.554968 kernel: audit: type=1300 audit(1752109182.513:1499): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff379b9210 a2=3 a3=0 items=0 ppid=1 pid=5218 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:42.556877 kernel: audit: type=1327 audit(1752109182.513:1499): proctitle=737368643A20636F7265205B707269765D Jul 10 00:59:42.513000 audit[5218]: CRED_ACQ pid=5218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:59:42.513000 audit[5218]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff379b9210 a2=3 a3=0 items=0 ppid=1 pid=5218 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:59:42.513000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 00:59:42.607286 sshd[5218]: Accepted publickey for core from 139.178.68.195 port 40900 ssh2: RSA SHA256:NVpdRDPpwzjVTzi6orhe1cA9BvcYymCSReGH8myOy/Q Jul 10 00:59:42.522687 sshd[5218]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:59:42.664589 systemd[1]: Started session-10.scope. Jul 10 00:59:42.680822 kernel: audit: type=1105 audit(1752109182.671:1500): pid=5218 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:59:42.680883 kernel: audit: type=1103 audit(1752109182.676:1501): pid=5223 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:59:42.671000 audit[5218]: USER_START pid=5218 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:59:42.676000 audit[5223]: CRED_ACQ pid=5223 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 00:59:42.666379 systemd-logind[1239]: New session 10 of user core. Jul 10 00:59:44.271039 env[1248]: 2025-07-10 00:59:42.981 [WARNING][5211] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--8555b5848b--wn4zc-eth0", GenerateName:"calico-apiserver-8555b5848b-", Namespace:"calico-apiserver", SelfLink:"", UID:"2344db36-50ac-4694-a93c-64e61cbf023f", ResourceVersion:"1120", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8555b5848b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1", Pod:"calico-apiserver-8555b5848b-wn4zc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibf75d8591a4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:59:44.271039 env[1248]: 2025-07-10 00:59:43.058 [INFO][5211] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" Jul 10 00:59:44.271039 env[1248]: 2025-07-10 00:59:43.059 [INFO][5211] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" iface="eth0" netns="" Jul 10 00:59:44.271039 env[1248]: 2025-07-10 00:59:43.059 [INFO][5211] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" Jul 10 00:59:44.271039 env[1248]: 2025-07-10 00:59:43.059 [INFO][5211] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" Jul 10 00:59:44.271039 env[1248]: 2025-07-10 00:59:44.108 [INFO][5229] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" HandleID="k8s-pod-network.dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" Workload="localhost-k8s-calico--apiserver--8555b5848b--wn4zc-eth0" Jul 10 00:59:44.271039 env[1248]: 2025-07-10 00:59:44.118 [INFO][5229] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:59:44.271039 env[1248]: 2025-07-10 00:59:44.118 [INFO][5229] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:59:44.271039 env[1248]: 2025-07-10 00:59:44.211 [WARNING][5229] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" HandleID="k8s-pod-network.dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" Workload="localhost-k8s-calico--apiserver--8555b5848b--wn4zc-eth0" Jul 10 00:59:44.271039 env[1248]: 2025-07-10 00:59:44.211 [INFO][5229] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" HandleID="k8s-pod-network.dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" Workload="localhost-k8s-calico--apiserver--8555b5848b--wn4zc-eth0" Jul 10 00:59:44.271039 env[1248]: 2025-07-10 00:59:44.212 [INFO][5229] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:59:44.271039 env[1248]: 2025-07-10 00:59:44.229 [INFO][5211] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" Jul 10 00:59:44.271039 env[1248]: time="2025-07-10T00:59:44.276711363Z" level=info msg="TearDown network for sandbox \"dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178\" successfully" Jul 10 00:59:44.271039 env[1248]: time="2025-07-10T00:59:44.276733247Z" level=info msg="StopPodSandbox for \"dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178\" returns successfully" Jul 10 00:59:54.375421 kubelet[2097]: I0710 00:59:46.323112 2097 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-4vdxb" podStartSLOduration=50.890280139 podStartE2EDuration="1m12.409862041s" podCreationTimestamp="2025-07-10 00:58:29 +0000 UTC" firstStartedPulling="2025-07-10 00:58:59.276250473 +0000 UTC m=+47.025648128" lastFinishedPulling="2025-07-10 00:59:20.795832382 +0000 UTC m=+68.545230030" observedRunningTime="2025-07-10 00:59:41.091358628 +0000 UTC m=+88.840756288" watchObservedRunningTime="2025-07-10 00:59:41.409862041 +0000 UTC m=+89.159259695" Jul 10 01:00:05.193924 systemd[1]: Started sshd@11-139.178.70.109:22-139.178.68.195:56060.service. Jul 10 01:00:05.358294 kernel: audit: type=1130 audit(1752109205.208:1502): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.109:22-139.178.68.195:56060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:00:05.362928 kernel: audit: type=1106 audit(1752109205.269:1503): pid=5218 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:05.363004 kernel: audit: type=1104 audit(1752109205.273:1504): pid=5218 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:05.363039 kernel: audit: type=1131 audit(1752109205.318:1505): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.109:22-139.178.68.195:40900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:00:05.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.109:22-139.178.68.195:56060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:00:05.269000 audit[5218]: USER_END pid=5218 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:05.273000 audit[5218]: CRED_DISP pid=5218 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:05.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.109:22-139.178.68.195:40900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:00:05.318442 systemd[1]: sshd@10-139.178.70.109:22-139.178.68.195:40900.service: Deactivated successfully. Jul 10 01:00:05.227943 sshd[5218]: pam_unix(sshd:session): session closed for user core Jul 10 01:00:05.381777 env[1248]: time="2025-07-10T01:00:05.257164442Z" level=info msg="RemovePodSandbox for \"dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178\"" Jul 10 01:00:05.381777 env[1248]: time="2025-07-10T01:00:05.257198827Z" level=info msg="Forcibly stopping sandbox \"dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178\"" Jul 10 01:00:05.326658 systemd[1]: session-10.scope: Deactivated successfully. Jul 10 01:00:05.326752 systemd[1]: session-10.scope: Consumed 3.307s CPU time. Jul 10 01:00:05.327214 systemd-logind[1239]: Session 10 logged out. Waiting for processes to exit. Jul 10 01:00:05.327769 systemd-logind[1239]: Removed session 10. Jul 10 01:00:05.461116 kubelet[2097]: I0710 01:00:05.456365 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tss9h\" (UniqueName: \"kubernetes.io/projected/76d695f8-81c0-45be-9f48-cecd8bd46097-kube-api-access-tss9h\") pod \"calico-apiserver-8555b5848b-8zdkn\" (UID: \"76d695f8-81c0-45be-9f48-cecd8bd46097\") " pod="calico-apiserver/calico-apiserver-8555b5848b-8zdkn" Jul 10 01:00:05.461116 kubelet[2097]: I0710 01:00:05.460104 2097 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/76d695f8-81c0-45be-9f48-cecd8bd46097-calico-apiserver-certs\") pod \"calico-apiserver-8555b5848b-8zdkn\" (UID: \"76d695f8-81c0-45be-9f48-cecd8bd46097\") " pod="calico-apiserver/calico-apiserver-8555b5848b-8zdkn" Jul 10 01:00:05.469573 kernel: audit: type=1101 audit(1752109205.464:1506): pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:05.464000 audit[5251]: USER_ACCT pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:05.476156 kernel: audit: type=1103 audit(1752109205.469:1507): pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:05.476197 kernel: audit: type=1006 audit(1752109205.469:1508): pid=5251 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Jul 10 01:00:05.476220 kernel: audit: type=1300 audit(1752109205.469:1508): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbcf64d70 a2=3 a3=0 items=0 ppid=1 pid=5251 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:05.480169 kernel: audit: type=1327 audit(1752109205.469:1508): proctitle=737368643A20636F7265205B707269765D Jul 10 01:00:05.469000 audit[5251]: CRED_ACQ pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:05.469000 audit[5251]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbcf64d70 a2=3 a3=0 items=0 ppid=1 pid=5251 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:05.469000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 01:00:05.493561 sshd[5251]: Accepted publickey for core from 139.178.68.195 port 56060 ssh2: RSA SHA256:NVpdRDPpwzjVTzi6orhe1cA9BvcYymCSReGH8myOy/Q Jul 10 01:00:05.481935 sshd[5251]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 01:00:05.585163 systemd[1]: Started session-11.scope. Jul 10 01:00:05.585430 systemd-logind[1239]: New session 11 of user core. Jul 10 01:00:05.591000 audit[5251]: USER_START pid=5251 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:05.596352 kernel: audit: type=1105 audit(1752109205.591:1509): pid=5251 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:05.596000 audit[5266]: CRED_ACQ pid=5266 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:05.737485 kubelet[2097]: E0710 01:00:05.731698 2097 goroutinemap.go:150] Operation for "/var/lib/kubelet/plugins_registry/csi.tigera.io-reg.sock" failed. No retries permitted until 2025-07-10 01:00:06.371524444 +0000 UTC m=+114.120922104 (durationBeforeRetry 1s). Error: RegisterPlugin error -- dial failed at socket /var/lib/kubelet/plugins_registry/csi.tigera.io-reg.sock, err: failed to dial socket /var/lib/kubelet/plugins_registry/csi.tigera.io-reg.sock, err: context deadline exceeded Jul 10 01:00:08.222495 env[1248]: 2025-07-10 01:00:06.982 [WARNING][5262] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--8555b5848b--wn4zc-eth0", GenerateName:"calico-apiserver-8555b5848b-", Namespace:"calico-apiserver", SelfLink:"", UID:"2344db36-50ac-4694-a93c-64e61cbf023f", ResourceVersion:"1120", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8555b5848b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"22158ea7a6dd022ed65b0103327c31b39c4b174283c6d6ae2be10c148bd06ba1", Pod:"calico-apiserver-8555b5848b-wn4zc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibf75d8591a4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 01:00:08.222495 env[1248]: 2025-07-10 01:00:07.061 [INFO][5262] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" Jul 10 01:00:08.222495 env[1248]: 2025-07-10 01:00:07.061 [INFO][5262] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" iface="eth0" netns="" Jul 10 01:00:08.222495 env[1248]: 2025-07-10 01:00:07.068 [INFO][5262] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" Jul 10 01:00:08.222495 env[1248]: 2025-07-10 01:00:07.068 [INFO][5262] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" Jul 10 01:00:08.222495 env[1248]: 2025-07-10 01:00:08.000 [INFO][5275] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" HandleID="k8s-pod-network.dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" Workload="localhost-k8s-calico--apiserver--8555b5848b--wn4zc-eth0" Jul 10 01:00:08.222495 env[1248]: 2025-07-10 01:00:08.008 [INFO][5275] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 01:00:08.222495 env[1248]: 2025-07-10 01:00:08.009 [INFO][5275] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 01:00:08.222495 env[1248]: 2025-07-10 01:00:08.115 [WARNING][5275] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" HandleID="k8s-pod-network.dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" Workload="localhost-k8s-calico--apiserver--8555b5848b--wn4zc-eth0" Jul 10 01:00:08.222495 env[1248]: 2025-07-10 01:00:08.115 [INFO][5275] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" HandleID="k8s-pod-network.dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" Workload="localhost-k8s-calico--apiserver--8555b5848b--wn4zc-eth0" Jul 10 01:00:08.222495 env[1248]: 2025-07-10 01:00:08.118 [INFO][5275] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 01:00:08.222495 env[1248]: 2025-07-10 01:00:08.154 [INFO][5262] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178" Jul 10 01:00:08.222495 env[1248]: time="2025-07-10T01:00:08.216182103Z" level=info msg="TearDown network for sandbox \"dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178\" successfully" Jul 10 01:00:08.420303 env[1248]: time="2025-07-10T01:00:08.287645924Z" level=info msg="RemovePodSandbox \"dae2b42d6b66b00a8de7e608b0c3eb3cc34be426da204a34ee8ab8da8445c178\" returns successfully" Jul 10 01:00:08.737000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:00:08.737000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000b9faa0 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:00:08.737000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:00:08.737000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:00:08.737000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001c3fb60 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:00:08.737000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:00:08.845000 audit[4645]: AVC avc: denied { watch } for pid=4645 comm="apiserver" path="/calico-apiserver-certs/..2025_07_10_00_58_42.1989100588/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c888 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c888 tclass=file permissive=0 Jul 10 01:00:08.845000 audit[4645]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0010ecf80 a2=fc6 a3=0 items=0 ppid=4006 pid=4645 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c888 key=(null) Jul 10 01:00:08.845000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 10 01:00:09.377000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:00:09.377000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=83 a1=c01128ce70 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 01:00:09.377000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 01:00:09.378000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:00:09.378000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=83 a1=c01128cea0 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 01:00:09.378000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 01:00:09.383000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:00:09.383000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=83 a1=c0111a67e0 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 01:00:09.383000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 01:00:09.383000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7325 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:00:09.383000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=83 a1=c011491980 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 01:00:09.383000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 01:00:09.386000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7319 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:00:09.386000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c01128cf90 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 01:00:09.386000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 01:00:09.386000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:00:09.386000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c0100e9240 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 01:00:09.386000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 01:00:11.352000 audit[4721]: AVC avc: denied { watch } for pid=4721 comm="apiserver" path="/calico-apiserver-certs/..2025_07_10_00_58_42.3409322352/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c17,c118 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c17,c118 tclass=file permissive=0 Jul 10 01:00:11.385714 kernel: kauditd_printk_skb: 28 callbacks suppressed Jul 10 01:00:11.396100 kernel: audit: type=1400 audit(1752109211.352:1520): avc: denied { watch } for pid=4721 comm="apiserver" path="/calico-apiserver-certs/..2025_07_10_00_58_42.3409322352/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c17,c118 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c17,c118 tclass=file permissive=0 Jul 10 01:00:11.398980 kernel: audit: type=1300 audit(1752109211.352:1520): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f90cc0 a2=fc6 a3=0 items=0 ppid=4277 pid=4721 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c17,c118 key=(null) Jul 10 01:00:11.399747 kernel: audit: type=1327 audit(1752109211.352:1520): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 10 01:00:11.352000 audit[4721]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f90cc0 a2=fc6 a3=0 items=0 ppid=4277 pid=4721 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c17,c118 key=(null) Jul 10 01:00:11.352000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 10 01:00:12.068054 systemd[1]: Created slice kubepods-besteffort-pod76d695f8_81c0_45be_9f48_cecd8bd46097.slice. Jul 10 01:00:12.584356 env[1248]: time="2025-07-10T01:00:12.579678413Z" level=info msg="StopPodSandbox for \"0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b\"" Jul 10 01:00:13.653481 env[1248]: 2025-07-10 01:00:13.136 [WARNING][5290] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-eth0", GenerateName:"calico-kube-controllers-65594c9c4c-", Namespace:"calico-system", SelfLink:"", UID:"79c54820-9de2-4eff-9b0c-ba6143dd7d8d", ResourceVersion:"1039", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65594c9c4c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96", Pod:"calico-kube-controllers-65594c9c4c-wld2r", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3c456433cd0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 01:00:13.653481 env[1248]: 2025-07-10 01:00:13.145 [INFO][5290] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" Jul 10 01:00:13.653481 env[1248]: 2025-07-10 01:00:13.145 [INFO][5290] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" iface="eth0" netns="" Jul 10 01:00:13.653481 env[1248]: 2025-07-10 01:00:13.146 [INFO][5290] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" Jul 10 01:00:13.653481 env[1248]: 2025-07-10 01:00:13.146 [INFO][5290] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" Jul 10 01:00:13.653481 env[1248]: 2025-07-10 01:00:13.574 [INFO][5297] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" HandleID="k8s-pod-network.0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" Workload="localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-eth0" Jul 10 01:00:13.653481 env[1248]: 2025-07-10 01:00:13.578 [INFO][5297] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 01:00:13.653481 env[1248]: 2025-07-10 01:00:13.580 [INFO][5297] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 01:00:13.653481 env[1248]: 2025-07-10 01:00:13.629 [WARNING][5297] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" HandleID="k8s-pod-network.0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" Workload="localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-eth0" Jul 10 01:00:13.653481 env[1248]: 2025-07-10 01:00:13.629 [INFO][5297] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" HandleID="k8s-pod-network.0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" Workload="localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-eth0" Jul 10 01:00:13.653481 env[1248]: 2025-07-10 01:00:13.629 [INFO][5297] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 01:00:13.653481 env[1248]: 2025-07-10 01:00:13.640 [INFO][5290] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" Jul 10 01:00:13.653481 env[1248]: time="2025-07-10T01:00:13.653506033Z" level=info msg="TearDown network for sandbox \"0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b\" successfully" Jul 10 01:00:13.653481 env[1248]: time="2025-07-10T01:00:13.653528009Z" level=info msg="StopPodSandbox for \"0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b\" returns successfully" Jul 10 01:00:14.645000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:00:14.710401 kernel: audit: type=1400 audit(1752109214.645:1521): avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:00:14.715845 kernel: audit: type=1300 audit(1752109214.645:1521): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0015e3be0 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:00:14.717306 kernel: audit: type=1327 audit(1752109214.645:1521): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:00:14.717343 kernel: audit: type=1400 audit(1752109214.652:1522): avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:00:14.718509 kernel: audit: type=1300 audit(1752109214.652:1522): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0003aa700 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:00:14.718534 kernel: audit: type=1327 audit(1752109214.652:1522): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:00:14.718580 kernel: audit: type=1400 audit(1752109214.686:1523): avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:00:14.645000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0015e3be0 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:00:14.645000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:00:14.652000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:00:14.652000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0003aa700 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:00:14.652000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:00:14.686000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:00:14.686000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0015e3c60 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:00:14.686000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:00:14.699000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:00:14.699000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0015e3c80 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:00:14.699000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:00:15.314061 sshd[5251]: pam_unix(sshd:session): session closed for user core Jul 10 01:00:15.350575 systemd[1]: Started sshd@12-139.178.70.109:22-139.178.68.195:47858.service. Jul 10 01:00:15.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.109:22-139.178.68.195:47858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:00:15.364000 audit[5251]: USER_END pid=5251 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:15.366000 audit[5251]: CRED_DISP pid=5251 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:15.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.109:22-139.178.68.195:56060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:00:15.372312 systemd[1]: sshd@11-139.178.70.109:22-139.178.68.195:56060.service: Deactivated successfully. Jul 10 01:00:15.372943 systemd[1]: session-11.scope: Deactivated successfully. Jul 10 01:00:15.373036 systemd[1]: session-11.scope: Consumed 1.349s CPU time. Jul 10 01:00:15.373911 systemd-logind[1239]: Session 11 logged out. Waiting for processes to exit. Jul 10 01:00:15.374840 systemd-logind[1239]: Removed session 11. Jul 10 01:00:15.451361 sshd[5311]: Accepted publickey for core from 139.178.68.195 port 47858 ssh2: RSA SHA256:NVpdRDPpwzjVTzi6orhe1cA9BvcYymCSReGH8myOy/Q Jul 10 01:00:15.450000 audit[5311]: USER_ACCT pid=5311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:15.452000 audit[5311]: CRED_ACQ pid=5311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:15.452000 audit[5311]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8ed05720 a2=3 a3=0 items=0 ppid=1 pid=5311 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:15.452000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 01:00:15.456462 sshd[5311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 01:00:15.512362 systemd[1]: Started session-12.scope. Jul 10 01:00:15.513348 systemd-logind[1239]: New session 12 of user core. Jul 10 01:00:15.517000 audit[5311]: USER_START pid=5311 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:15.518000 audit[5314]: CRED_ACQ pid=5314 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:17.608901 env[1248]: time="2025-07-10T01:00:17.608651118Z" level=info msg="RemovePodSandbox for \"0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b\"" Jul 10 01:00:17.608901 env[1248]: time="2025-07-10T01:00:17.608689591Z" level=info msg="Forcibly stopping sandbox \"0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b\"" Jul 10 01:00:19.728561 env[1248]: 2025-07-10 01:00:19.066 [WARNING][5332] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-eth0", GenerateName:"calico-kube-controllers-65594c9c4c-", Namespace:"calico-system", SelfLink:"", UID:"79c54820-9de2-4eff-9b0c-ba6143dd7d8d", ResourceVersion:"1039", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65594c9c4c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f69a1a3bebbc390f5cafd773ac836cb3b50a5f0362215ef8ac2d618a3daccd96", Pod:"calico-kube-controllers-65594c9c4c-wld2r", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3c456433cd0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 01:00:19.728561 env[1248]: 2025-07-10 01:00:19.083 [INFO][5332] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" Jul 10 01:00:19.728561 env[1248]: 2025-07-10 01:00:19.083 [INFO][5332] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" iface="eth0" netns="" Jul 10 01:00:19.728561 env[1248]: 2025-07-10 01:00:19.084 [INFO][5332] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" Jul 10 01:00:19.728561 env[1248]: 2025-07-10 01:00:19.084 [INFO][5332] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" Jul 10 01:00:19.728561 env[1248]: 2025-07-10 01:00:19.574 [INFO][5339] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" HandleID="k8s-pod-network.0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" Workload="localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-eth0" Jul 10 01:00:19.728561 env[1248]: 2025-07-10 01:00:19.582 [INFO][5339] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 01:00:19.728561 env[1248]: 2025-07-10 01:00:19.584 [INFO][5339] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 01:00:19.728561 env[1248]: 2025-07-10 01:00:19.680 [WARNING][5339] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" HandleID="k8s-pod-network.0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" Workload="localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-eth0" Jul 10 01:00:19.728561 env[1248]: 2025-07-10 01:00:19.680 [INFO][5339] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" HandleID="k8s-pod-network.0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" Workload="localhost-k8s-calico--kube--controllers--65594c9c4c--wld2r-eth0" Jul 10 01:00:19.728561 env[1248]: 2025-07-10 01:00:19.683 [INFO][5339] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 01:00:19.728561 env[1248]: 2025-07-10 01:00:19.686 [INFO][5332] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b" Jul 10 01:00:19.728561 env[1248]: time="2025-07-10T01:00:19.718812736Z" level=info msg="TearDown network for sandbox \"0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b\" successfully" Jul 10 01:00:19.795292 env[1248]: time="2025-07-10T01:00:19.743577958Z" level=info msg="RemovePodSandbox \"0728907d975e4923f89a97eacf328c622ede142f66ede1881ad4163cdf75021b\" returns successfully" Jul 10 01:00:20.913000 audit[4837]: AVC avc: denied { watch } for pid=4837 comm="apiserver" path="/calico-apiserver-certs/..2025_07_10_00_58_42.1504779381/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c175 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c39,c175 tclass=file permissive=0 Jul 10 01:00:21.051542 kernel: kauditd_printk_skb: 16 callbacks suppressed Jul 10 01:00:21.057443 kernel: audit: type=1400 audit(1752109220.913:1534): avc: denied { watch } for pid=4837 comm="apiserver" path="/calico-apiserver-certs/..2025_07_10_00_58_42.1504779381/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c175 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c39,c175 tclass=file permissive=0 Jul 10 01:00:21.058191 kernel: audit: type=1300 audit(1752109220.913:1534): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001e8c260 a2=fc6 a3=0 items=0 ppid=4413 pid=4837 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c175 key=(null) Jul 10 01:00:21.058219 kernel: audit: type=1327 audit(1752109220.913:1534): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 10 01:00:20.913000 audit[4837]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001e8c260 a2=fc6 a3=0 items=0 ppid=4413 pid=4837 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c175 key=(null) Jul 10 01:00:20.913000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 10 01:00:25.662645 env[1248]: time="2025-07-10T01:00:25.660765897Z" level=info msg="StopPodSandbox for \"7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc\"" Jul 10 01:00:27.087494 sshd[5311]: pam_unix(sshd:session): session closed for user core Jul 10 01:00:27.220986 kernel: audit: type=1106 audit(1752109227.151:1535): pid=5311 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:27.239190 kernel: audit: type=1104 audit(1752109227.155:1536): pid=5311 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:27.239253 kernel: audit: type=1131 audit(1752109227.187:1537): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.109:22-139.178.68.195:47858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:00:27.151000 audit[5311]: USER_END pid=5311 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:27.155000 audit[5311]: CRED_DISP pid=5311 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:27.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.109:22-139.178.68.195:47858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:00:27.179036 systemd[1]: sshd@12-139.178.70.109:22-139.178.68.195:47858.service: Deactivated successfully. Jul 10 01:00:27.195000 systemd[1]: session-12.scope: Deactivated successfully. Jul 10 01:00:27.195088 systemd[1]: session-12.scope: Consumed 1.415s CPU time. Jul 10 01:00:27.197534 systemd-logind[1239]: Session 12 logged out. Waiting for processes to exit. Jul 10 01:00:27.221657 systemd-logind[1239]: Removed session 12. Jul 10 01:00:27.978697 env[1248]: 2025-07-10 01:00:26.941 [WARNING][5382] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" WorkloadEndpoint="localhost-k8s-whisker--7ccc65fc49--j64q2-eth0" Jul 10 01:00:27.978697 env[1248]: 2025-07-10 01:00:26.948 [INFO][5382] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" Jul 10 01:00:27.978697 env[1248]: 2025-07-10 01:00:26.948 [INFO][5382] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" iface="eth0" netns="" Jul 10 01:00:27.978697 env[1248]: 2025-07-10 01:00:26.948 [INFO][5382] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" Jul 10 01:00:27.978697 env[1248]: 2025-07-10 01:00:26.948 [INFO][5382] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" Jul 10 01:00:27.978697 env[1248]: 2025-07-10 01:00:27.824 [INFO][5389] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" HandleID="k8s-pod-network.7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" Workload="localhost-k8s-whisker--7ccc65fc49--j64q2-eth0" Jul 10 01:00:27.978697 env[1248]: 2025-07-10 01:00:27.835 [INFO][5389] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 01:00:27.978697 env[1248]: 2025-07-10 01:00:27.836 [INFO][5389] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 01:00:27.978697 env[1248]: 2025-07-10 01:00:27.939 [WARNING][5389] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" HandleID="k8s-pod-network.7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" Workload="localhost-k8s-whisker--7ccc65fc49--j64q2-eth0" Jul 10 01:00:27.978697 env[1248]: 2025-07-10 01:00:27.939 [INFO][5389] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" HandleID="k8s-pod-network.7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" Workload="localhost-k8s-whisker--7ccc65fc49--j64q2-eth0" Jul 10 01:00:27.978697 env[1248]: 2025-07-10 01:00:27.942 [INFO][5389] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 01:00:27.978697 env[1248]: 2025-07-10 01:00:27.958 [INFO][5382] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" Jul 10 01:00:27.978697 env[1248]: time="2025-07-10T01:00:27.979433619Z" level=info msg="TearDown network for sandbox \"7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc\" successfully" Jul 10 01:00:27.978697 env[1248]: time="2025-07-10T01:00:27.979455173Z" level=info msg="StopPodSandbox for \"7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc\" returns successfully" Jul 10 01:00:29.867974 env[1248]: time="2025-07-10T01:00:29.867663688Z" level=info msg="RemovePodSandbox for \"7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc\"" Jul 10 01:00:29.867974 env[1248]: time="2025-07-10T01:00:29.867690304Z" level=info msg="Forcibly stopping sandbox \"7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc\"" Jul 10 01:00:31.855966 env[1248]: 2025-07-10 01:00:31.059 [WARNING][5406] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" WorkloadEndpoint="localhost-k8s-whisker--7ccc65fc49--j64q2-eth0" Jul 10 01:00:31.855966 env[1248]: 2025-07-10 01:00:31.084 [INFO][5406] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" Jul 10 01:00:31.855966 env[1248]: 2025-07-10 01:00:31.087 [INFO][5406] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" iface="eth0" netns="" Jul 10 01:00:31.855966 env[1248]: 2025-07-10 01:00:31.088 [INFO][5406] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" Jul 10 01:00:31.855966 env[1248]: 2025-07-10 01:00:31.088 [INFO][5406] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" Jul 10 01:00:31.855966 env[1248]: 2025-07-10 01:00:31.678 [INFO][5413] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" HandleID="k8s-pod-network.7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" Workload="localhost-k8s-whisker--7ccc65fc49--j64q2-eth0" Jul 10 01:00:31.855966 env[1248]: 2025-07-10 01:00:31.696 [INFO][5413] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 01:00:31.855966 env[1248]: 2025-07-10 01:00:31.698 [INFO][5413] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 01:00:31.855966 env[1248]: 2025-07-10 01:00:31.772 [WARNING][5413] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" HandleID="k8s-pod-network.7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" Workload="localhost-k8s-whisker--7ccc65fc49--j64q2-eth0" Jul 10 01:00:31.855966 env[1248]: 2025-07-10 01:00:31.772 [INFO][5413] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" HandleID="k8s-pod-network.7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" Workload="localhost-k8s-whisker--7ccc65fc49--j64q2-eth0" Jul 10 01:00:31.855966 env[1248]: 2025-07-10 01:00:31.778 [INFO][5413] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 01:00:31.855966 env[1248]: 2025-07-10 01:00:31.840 [INFO][5406] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc" Jul 10 01:00:31.855966 env[1248]: time="2025-07-10T01:00:31.855260393Z" level=info msg="TearDown network for sandbox \"7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc\" successfully" Jul 10 01:00:31.912458 env[1248]: time="2025-07-10T01:00:31.875768024Z" level=info msg="RemovePodSandbox \"7c8da9bb57c414e4e9b71bd3ca2ed63dd77f462e1f6258971c8ac0a9f89885cc\" returns successfully" Jul 10 01:00:32.091918 systemd[1]: Started sshd@13-139.178.70.109:22-139.178.68.195:39410.service. Jul 10 01:00:32.110426 kernel: audit: type=1130 audit(1752109232.094:1538): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.109:22-139.178.68.195:39410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:00:32.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.109:22-139.178.68.195:39410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:00:32.644000 audit[5420]: USER_ACCT pid=5420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:32.669645 kernel: audit: type=1101 audit(1752109232.644:1539): pid=5420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:32.670830 kernel: audit: type=1103 audit(1752109232.654:1540): pid=5420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:32.670871 kernel: audit: type=1006 audit(1752109232.654:1541): pid=5420 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Jul 10 01:00:32.670890 kernel: audit: type=1300 audit(1752109232.654:1541): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff69765ca0 a2=3 a3=0 items=0 ppid=1 pid=5420 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:32.671947 kernel: audit: type=1327 audit(1752109232.654:1541): proctitle=737368643A20636F7265205B707269765D Jul 10 01:00:32.654000 audit[5420]: CRED_ACQ pid=5420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:32.654000 audit[5420]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff69765ca0 a2=3 a3=0 items=0 ppid=1 pid=5420 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:32.654000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 01:00:32.693276 sshd[5420]: Accepted publickey for core from 139.178.68.195 port 39410 ssh2: RSA SHA256:NVpdRDPpwzjVTzi6orhe1cA9BvcYymCSReGH8myOy/Q Jul 10 01:00:32.669830 sshd[5420]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 01:00:32.718936 systemd-logind[1239]: New session 13 of user core. Jul 10 01:00:32.720935 systemd[1]: Started session-13.scope. Jul 10 01:00:32.728000 audit[5420]: USER_START pid=5420 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:32.732000 audit[5422]: CRED_ACQ pid=5422 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:32.736216 kernel: audit: type=1105 audit(1752109232.728:1542): pid=5420 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:32.736267 kernel: audit: type=1103 audit(1752109232.732:1543): pid=5422 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:00:33.167517 kubelet[2097]: E0710 01:00:33.161758 2097 goroutinemap.go:150] Operation for "/var/lib/kubelet/plugins_registry/csi.tigera.io-reg.sock" failed. No retries permitted until 2025-07-10 01:00:34.705168318 +0000 UTC m=+142.454565970 (durationBeforeRetry 2s). Error: RegisterPlugin error -- failed to get plugin info using RPC GetInfo at socket /var/lib/kubelet/plugins_registry/csi.tigera.io-reg.sock, err: rpc error: code = DeadlineExceeded desc = context deadline exceeded Jul 10 01:00:33.184485 env[1248]: time="2025-07-10T01:00:33.184218843Z" level=info msg="StopPodSandbox for \"74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051\"" Jul 10 01:00:33.547063 systemd[1]: sshd@8-139.178.70.109:22-218.78.46.81:40990.service: Deactivated successfully. Jul 10 01:00:33.560646 kernel: audit: type=1131 audit(1752109233.548:1544): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.109:22-218.78.46.81:40990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:00:33.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.109:22-218.78.46.81:40990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:00:33.578794 env[1248]: time="2025-07-10T01:00:33.578710289Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8555b5848b-8zdkn,Uid:76d695f8-81c0-45be-9f48-cecd8bd46097,Namespace:calico-apiserver,Attempt:0,}" Jul 10 01:00:35.560963 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 10 01:00:35.731867 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8aa03c1347a: link becomes ready Jul 10 01:00:35.652858 systemd-networkd[1059]: cali8aa03c1347a: Link UP Jul 10 01:00:35.653000 systemd-networkd[1059]: cali8aa03c1347a: Gained carrier Jul 10 01:00:36.696525 systemd-networkd[1059]: cali8aa03c1347a: Gained IPv6LL Jul 10 01:00:38.035424 env[1248]: 2025-07-10 01:00:33.990 [INFO][5444] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--8555b5848b--8zdkn-eth0 calico-apiserver-8555b5848b- calico-apiserver 76d695f8-81c0-45be-9f48-cecd8bd46097 1150 0 2025-07-10 00:59:25 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:8555b5848b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-8555b5848b-8zdkn eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali8aa03c1347a [] [] }} ContainerID="9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3" Namespace="calico-apiserver" Pod="calico-apiserver-8555b5848b-8zdkn" WorkloadEndpoint="localhost-k8s-calico--apiserver--8555b5848b--8zdkn-" Jul 10 01:00:38.035424 env[1248]: 2025-07-10 01:00:33.994 [INFO][5444] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3" Namespace="calico-apiserver" Pod="calico-apiserver-8555b5848b-8zdkn" WorkloadEndpoint="localhost-k8s-calico--apiserver--8555b5848b--8zdkn-eth0" Jul 10 01:00:38.035424 env[1248]: 2025-07-10 01:00:34.525 [INFO][5459] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3" HandleID="k8s-pod-network.9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3" Workload="localhost-k8s-calico--apiserver--8555b5848b--8zdkn-eth0" Jul 10 01:00:38.035424 env[1248]: 2025-07-10 01:00:34.540 [INFO][5459] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3" HandleID="k8s-pod-network.9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3" Workload="localhost-k8s-calico--apiserver--8555b5848b--8zdkn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cd160), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-8555b5848b-8zdkn", "timestamp":"2025-07-10 01:00:34.523397148 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 01:00:38.035424 env[1248]: 2025-07-10 01:00:34.540 [INFO][5459] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 01:00:38.035424 env[1248]: 2025-07-10 01:00:34.543 [INFO][5459] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 01:00:38.035424 env[1248]: 2025-07-10 01:00:34.545 [INFO][5459] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Jul 10 01:00:38.035424 env[1248]: 2025-07-10 01:00:34.776 [INFO][5459] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3" host="localhost" Jul 10 01:00:38.035424 env[1248]: 2025-07-10 01:00:34.885 [INFO][5459] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" Jul 10 01:00:38.035424 env[1248]: 2025-07-10 01:00:34.921 [INFO][5459] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" Jul 10 01:00:38.035424 env[1248]: 2025-07-10 01:00:35.007 [INFO][5459] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" Jul 10 01:00:38.035424 env[1248]: 2025-07-10 01:00:35.034 [INFO][5459] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Jul 10 01:00:38.035424 env[1248]: 2025-07-10 01:00:35.034 [INFO][5459] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3" host="localhost" Jul 10 01:00:38.035424 env[1248]: 2025-07-10 01:00:35.063 [INFO][5459] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3 Jul 10 01:00:38.035424 env[1248]: 2025-07-10 01:00:35.237 [INFO][5459] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3" host="localhost" Jul 10 01:00:38.035424 env[1248]: 2025-07-10 01:00:35.287 [INFO][5459] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.138/26] block=192.168.88.128/26 handle="k8s-pod-network.9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3" host="localhost" Jul 10 01:00:38.035424 env[1248]: 2025-07-10 01:00:35.288 [INFO][5459] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.138/26] handle="k8s-pod-network.9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3" host="localhost" Jul 10 01:00:38.035424 env[1248]: 2025-07-10 01:00:35.297 [INFO][5459] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 01:00:38.035424 env[1248]: 2025-07-10 01:00:35.306 [INFO][5459] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.138/26] IPv6=[] ContainerID="9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3" HandleID="k8s-pod-network.9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3" Workload="localhost-k8s-calico--apiserver--8555b5848b--8zdkn-eth0" Jul 10 01:00:38.200358 env[1248]: 2025-07-10 01:00:35.443 [INFO][5444] cni-plugin/k8s.go 418: Populated endpoint ContainerID="9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3" Namespace="calico-apiserver" Pod="calico-apiserver-8555b5848b-8zdkn" WorkloadEndpoint="localhost-k8s-calico--apiserver--8555b5848b--8zdkn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--8555b5848b--8zdkn-eth0", GenerateName:"calico-apiserver-8555b5848b-", Namespace:"calico-apiserver", SelfLink:"", UID:"76d695f8-81c0-45be-9f48-cecd8bd46097", ResourceVersion:"1150", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 59, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8555b5848b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-8555b5848b-8zdkn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.138/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8aa03c1347a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 01:00:38.200358 env[1248]: 2025-07-10 01:00:35.479 [INFO][5444] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.138/32] ContainerID="9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3" Namespace="calico-apiserver" Pod="calico-apiserver-8555b5848b-8zdkn" WorkloadEndpoint="localhost-k8s-calico--apiserver--8555b5848b--8zdkn-eth0" Jul 10 01:00:38.200358 env[1248]: 2025-07-10 01:00:35.487 [INFO][5444] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8aa03c1347a ContainerID="9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3" Namespace="calico-apiserver" Pod="calico-apiserver-8555b5848b-8zdkn" WorkloadEndpoint="localhost-k8s-calico--apiserver--8555b5848b--8zdkn-eth0" Jul 10 01:00:38.200358 env[1248]: 2025-07-10 01:00:35.564 [INFO][5444] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3" Namespace="calico-apiserver" Pod="calico-apiserver-8555b5848b-8zdkn" WorkloadEndpoint="localhost-k8s-calico--apiserver--8555b5848b--8zdkn-eth0" Jul 10 01:00:38.200358 env[1248]: 2025-07-10 01:00:35.584 [INFO][5444] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3" Namespace="calico-apiserver" Pod="calico-apiserver-8555b5848b-8zdkn" WorkloadEndpoint="localhost-k8s-calico--apiserver--8555b5848b--8zdkn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--8555b5848b--8zdkn-eth0", GenerateName:"calico-apiserver-8555b5848b-", Namespace:"calico-apiserver", SelfLink:"", UID:"76d695f8-81c0-45be-9f48-cecd8bd46097", ResourceVersion:"1150", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 59, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8555b5848b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3", Pod:"calico-apiserver-8555b5848b-8zdkn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.138/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8aa03c1347a", MAC:"1e:11:d2:2c:38:c0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 01:00:38.200358 env[1248]: 2025-07-10 01:00:37.901 [INFO][5444] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3" Namespace="calico-apiserver" Pod="calico-apiserver-8555b5848b-8zdkn" WorkloadEndpoint="localhost-k8s-calico--apiserver--8555b5848b--8zdkn-eth0" Jul 10 01:00:38.203823 env[1248]: 2025-07-10 01:00:33.985 [WARNING][5438] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--768f4c5c69--6bh96-eth0", GenerateName:"goldmane-768f4c5c69-", Namespace:"calico-system", SelfLink:"", UID:"dfc77fd4-c756-489e-a5e3-3692e4542650", ResourceVersion:"1101", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"768f4c5c69", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d", Pod:"goldmane-768f4c5c69-6bh96", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali2d2672c812b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 01:00:38.203823 env[1248]: 2025-07-10 01:00:33.993 [INFO][5438] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" Jul 10 01:00:38.203823 env[1248]: 2025-07-10 01:00:33.993 [INFO][5438] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" iface="eth0" netns="" Jul 10 01:00:38.203823 env[1248]: 2025-07-10 01:00:33.997 [INFO][5438] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" Jul 10 01:00:38.203823 env[1248]: 2025-07-10 01:00:33.997 [INFO][5438] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" Jul 10 01:00:38.203823 env[1248]: 2025-07-10 01:00:34.523 [INFO][5457] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" HandleID="k8s-pod-network.74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" Workload="localhost-k8s-goldmane--768f4c5c69--6bh96-eth0" Jul 10 01:00:38.203823 env[1248]: 2025-07-10 01:00:34.540 [INFO][5457] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 01:00:38.203823 env[1248]: 2025-07-10 01:00:35.292 [INFO][5457] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 01:00:38.203823 env[1248]: 2025-07-10 01:00:37.068 [WARNING][5457] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" HandleID="k8s-pod-network.74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" Workload="localhost-k8s-goldmane--768f4c5c69--6bh96-eth0" Jul 10 01:00:38.203823 env[1248]: 2025-07-10 01:00:37.084 [INFO][5457] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" HandleID="k8s-pod-network.74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" Workload="localhost-k8s-goldmane--768f4c5c69--6bh96-eth0" Jul 10 01:00:38.203823 env[1248]: 2025-07-10 01:00:38.020 [INFO][5457] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 01:00:38.203823 env[1248]: 2025-07-10 01:00:38.062 [INFO][5438] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" Jul 10 01:00:38.203823 env[1248]: time="2025-07-10T01:00:38.073849890Z" level=info msg="TearDown network for sandbox \"74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051\" successfully" Jul 10 01:00:38.203823 env[1248]: time="2025-07-10T01:00:38.073870936Z" level=info msg="StopPodSandbox for \"74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051\" returns successfully" Jul 10 01:00:38.387980 env[1248]: time="2025-07-10T01:00:38.387925404Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 01:00:38.404971 env[1248]: time="2025-07-10T01:00:38.387982802Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 01:00:38.404971 env[1248]: time="2025-07-10T01:00:38.387999811Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 01:00:38.404971 env[1248]: time="2025-07-10T01:00:38.388226142Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3 pid=5487 runtime=io.containerd.runc.v2 Jul 10 01:00:38.523689 systemd[1]: Started cri-containerd-9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3.scope. Jul 10 01:00:38.576980 kernel: audit: type=1400 audit(1752109238.537:1545): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.585175 kernel: audit: type=1400 audit(1752109238.537:1546): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.586774 kernel: audit: type=1400 audit(1752109238.537:1547): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.586807 kernel: audit: type=1400 audit(1752109238.537:1548): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.588621 kernel: audit: type=1400 audit(1752109238.537:1549): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.589861 kernel: audit: type=1400 audit(1752109238.537:1550): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.589887 kernel: audit: type=1400 audit(1752109238.537:1551): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.589906 kernel: audit: type=1400 audit(1752109238.537:1552): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.589924 kernel: audit: type=1400 audit(1752109238.537:1553): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.590739 kernel: audit: type=1400 audit(1752109238.537:1554): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.537000 audit: BPF prog-id=239 op=LOAD Jul 10 01:00:38.547000 audit[5499]: AVC avc: denied { bpf } for pid=5499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.547000 audit[5499]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000141c48 a2=10 a3=1c items=0 ppid=5487 pid=5499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:38.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964613638613933613062373634306563383861383061363764326636 Jul 10 01:00:38.547000 audit[5499]: AVC avc: denied { perfmon } for pid=5499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.547000 audit[5499]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001416b0 a2=3c a3=c items=0 ppid=5487 pid=5499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:38.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964613638613933613062373634306563383861383061363764326636 Jul 10 01:00:38.547000 audit[5499]: AVC avc: denied { bpf } for pid=5499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.547000 audit[5499]: AVC avc: denied { bpf } for pid=5499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.547000 audit[5499]: AVC avc: denied { bpf } for pid=5499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.547000 audit[5499]: AVC avc: denied { perfmon } for pid=5499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.547000 audit[5499]: AVC avc: denied { perfmon } for pid=5499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.547000 audit[5499]: AVC avc: denied { perfmon } for pid=5499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.547000 audit[5499]: AVC avc: denied { perfmon } for pid=5499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.547000 audit[5499]: AVC avc: denied { perfmon } for pid=5499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.547000 audit[5499]: AVC avc: denied { bpf } for pid=5499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.547000 audit[5499]: AVC avc: denied { bpf } for pid=5499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.547000 audit: BPF prog-id=240 op=LOAD Jul 10 01:00:38.547000 audit[5499]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001419d8 a2=78 a3=c00029b310 items=0 ppid=5487 pid=5499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:38.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964613638613933613062373634306563383861383061363764326636 Jul 10 01:00:38.554000 audit[5499]: AVC avc: denied { bpf } for pid=5499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.554000 audit[5499]: AVC avc: denied { bpf } for pid=5499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.554000 audit[5499]: AVC avc: denied { perfmon } for pid=5499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.554000 audit[5499]: AVC avc: denied { perfmon } for pid=5499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.554000 audit[5499]: AVC avc: denied { perfmon } for pid=5499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.554000 audit[5499]: AVC avc: denied { perfmon } for pid=5499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.554000 audit[5499]: AVC avc: denied { perfmon } for pid=5499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.554000 audit[5499]: AVC avc: denied { bpf } for pid=5499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.554000 audit[5499]: AVC avc: denied { bpf } for pid=5499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.554000 audit: BPF prog-id=241 op=LOAD Jul 10 01:00:38.554000 audit[5499]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000141770 a2=78 a3=c00029b358 items=0 ppid=5487 pid=5499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:38.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964613638613933613062373634306563383861383061363764326636 Jul 10 01:00:38.556000 audit: BPF prog-id=241 op=UNLOAD Jul 10 01:00:38.556000 audit: BPF prog-id=240 op=UNLOAD Jul 10 01:00:38.556000 audit[5499]: AVC avc: denied { bpf } for pid=5499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.556000 audit[5499]: AVC avc: denied { bpf } for pid=5499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.556000 audit[5499]: AVC avc: denied { bpf } for pid=5499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.556000 audit[5499]: AVC avc: denied { perfmon } for pid=5499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.556000 audit[5499]: AVC avc: denied { perfmon } for pid=5499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.556000 audit[5499]: AVC avc: denied { perfmon } for pid=5499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.556000 audit[5499]: AVC avc: denied { perfmon } for pid=5499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.556000 audit[5499]: AVC avc: denied { perfmon } for pid=5499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.556000 audit[5499]: AVC avc: denied { bpf } for pid=5499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.556000 audit[5499]: AVC avc: denied { bpf } for pid=5499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:00:38.556000 audit: BPF prog-id=242 op=LOAD Jul 10 01:00:38.556000 audit[5499]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000141c30 a2=78 a3=c00029b768 items=0 ppid=5487 pid=5499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:38.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964613638613933613062373634306563383861383061363764326636 Jul 10 01:00:38.574913 systemd-resolved[1203]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 01:00:38.633500 env[1248]: time="2025-07-10T01:00:38.595596285Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8555b5848b-8zdkn,Uid:76d695f8-81c0-45be-9f48-cecd8bd46097,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3\"" Jul 10 01:00:38.673000 audit[5524]: NETFILTER_CFG table=filter:136 family=2 entries=61 op=nft_register_chain pid=5524 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 01:00:38.673000 audit[5524]: SYSCALL arch=c000003e syscall=46 success=yes exit=28984 a0=3 a1=7ffdbb4e3b80 a2=0 a3=7ffdbb4e3b6c items=0 ppid=3380 pid=5524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:00:38.673000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 01:00:44.854477 systemd[1]: Started sshd@14-139.178.70.109:22-218.78.46.81:52535.service. Jul 10 01:00:44.934674 kernel: kauditd_printk_skb: 50 callbacks suppressed Jul 10 01:00:44.940463 kernel: audit: type=1130 audit(1752109244.857:1564): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.109:22-218.78.46.81:52535 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:00:44.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.109:22-218.78.46.81:52535 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:02.462635 sshd[5528]: Connection reset by 218.78.46.81 port 52535 [preauth] Jul 10 01:01:02.668416 kernel: audit: type=1131 audit(1752109262.498:1565): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.109:22-218.78.46.81:52535 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:02.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.109:22-218.78.46.81:52535 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:02.491449 systemd[1]: sshd@14-139.178.70.109:22-218.78.46.81:52535.service: Deactivated successfully. Jul 10 01:01:08.968000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:09.593464 kernel: audit: type=1400 audit(1752109268.968:1566): avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:09.657619 kernel: audit: type=1300 audit(1752109268.968:1566): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001324520 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:01:09.657686 kernel: audit: type=1327 audit(1752109268.968:1566): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:01:09.679094 kernel: audit: type=1400 audit(1752109268.975:1567): avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:09.679132 kernel: audit: type=1300 audit(1752109268.975:1567): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0016adf80 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:01:09.686917 kernel: audit: type=1327 audit(1752109268.975:1567): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:01:09.686946 kernel: audit: type=1400 audit(1752109269.327:1568): avc: denied { watch } for pid=4645 comm="apiserver" path="/calico-apiserver-certs/..2025_07_10_00_58_42.1989100588/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c888 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c888 tclass=file permissive=0 Jul 10 01:01:09.707434 kernel: audit: type=1300 audit(1752109269.327:1568): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0010ed2c0 a2=fc6 a3=0 items=0 ppid=4006 pid=4645 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c888 key=(null) Jul 10 01:01:09.707470 kernel: audit: type=1327 audit(1752109269.327:1568): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 10 01:01:08.968000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001324520 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:01:08.968000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:01:08.975000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:08.975000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0016adf80 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:01:08.975000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:01:09.327000 audit[4645]: AVC avc: denied { watch } for pid=4645 comm="apiserver" path="/calico-apiserver-certs/..2025_07_10_00_58_42.1989100588/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c888 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c888 tclass=file permissive=0 Jul 10 01:01:09.327000 audit[4645]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0010ed2c0 a2=fc6 a3=0 items=0 ppid=4006 pid=4645 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c888 key=(null) Jul 10 01:01:09.327000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 10 01:01:10.835000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:10.883363 kernel: audit: type=1400 audit(1752109270.835:1569): avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:10.835000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c0067681e0 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 01:01:10.835000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 01:01:10.875000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7319 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:10.875000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c006768210 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 01:01:10.875000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 01:01:10.878000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:10.878000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=83 a1=c007cb9580 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 01:01:10.878000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 01:01:10.883000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:10.883000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c00ca89f60 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 01:01:10.883000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 01:01:10.895000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7325 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:10.895000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c003606c90 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 01:01:10.895000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 01:01:11.117000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:11.117000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0067693e0 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 01:01:11.117000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 01:01:11.712000 audit[4721]: AVC avc: denied { watch } for pid=4721 comm="apiserver" path="/calico-apiserver-certs/..2025_07_10_00_58_42.3409322352/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c17,c118 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c17,c118 tclass=file permissive=0 Jul 10 01:01:11.712000 audit[4721]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000bf92a0 a2=fc6 a3=0 items=0 ppid=4277 pid=4721 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c17,c118 key=(null) Jul 10 01:01:11.712000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 10 01:01:15.135000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:15.806956 kernel: kauditd_printk_skb: 20 callbacks suppressed Jul 10 01:01:15.847929 kernel: audit: type=1400 audit(1752109275.135:1576): avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:15.856101 kernel: audit: type=1300 audit(1752109275.135:1576): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001324600 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:01:15.861805 kernel: audit: type=1327 audit(1752109275.135:1576): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:01:15.861850 kernel: audit: type=1400 audit(1752109275.218:1577): avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:15.864576 kernel: audit: type=1300 audit(1752109275.218:1577): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c001465aa0 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:01:15.864616 kernel: audit: type=1327 audit(1752109275.218:1577): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:01:15.867276 kernel: audit: type=1400 audit(1752109275.221:1578): avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:15.867313 kernel: audit: type=1300 audit(1752109275.221:1578): arch=c000003e syscall=254 success=no exit=-13 a0=f a1=c001324620 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:01:15.867353 kernel: audit: type=1327 audit(1752109275.221:1578): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:01:15.867406 kernel: audit: type=1400 audit(1752109275.370:1579): avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:15.135000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001324600 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:01:15.135000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:01:15.218000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:15.218000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c001465aa0 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:01:15.218000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:01:15.221000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:15.221000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=f a1=c001324620 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:01:15.221000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:01:15.370000 audit[1932]: AVC avc: denied { watch } for pid=1932 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:15.370000 audit[1932]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001465ac0 a2=fc6 a3=0 items=0 ppid=1781 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:01:15.370000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:01:18.772609 systemd[1]: cri-containerd-5bf0a0cb3e24f83dae79785364c46e32afbf46ffac3c163c59054ebebc620d5e.scope: Deactivated successfully. Jul 10 01:01:18.791000 audit: BPF prog-id=75 op=UNLOAD Jul 10 01:01:18.791000 audit: BPF prog-id=82 op=UNLOAD Jul 10 01:01:18.794000 audit: BPF prog-id=114 op=UNLOAD Jul 10 01:01:18.797000 audit: BPF prog-id=117 op=UNLOAD Jul 10 01:01:19.064070 env[1248]: time="2025-07-10T01:01:18.805531557Z" level=info msg="shim disconnected" id=663c36b4eded040db8a2cde1c98e6c2b557e9979d922675973e996efd7ffa3bc Jul 10 01:01:19.064070 env[1248]: time="2025-07-10T01:01:18.805561060Z" level=warning msg="cleaning up after shim disconnected" id=663c36b4eded040db8a2cde1c98e6c2b557e9979d922675973e996efd7ffa3bc namespace=k8s.io Jul 10 01:01:19.064070 env[1248]: time="2025-07-10T01:01:18.805567005Z" level=info msg="cleaning up dead shim" Jul 10 01:01:19.064070 env[1248]: time="2025-07-10T01:01:18.807837850Z" level=info msg="shim disconnected" id=5bf0a0cb3e24f83dae79785364c46e32afbf46ffac3c163c59054ebebc620d5e Jul 10 01:01:19.064070 env[1248]: time="2025-07-10T01:01:18.807863990Z" level=warning msg="cleaning up after shim disconnected" id=5bf0a0cb3e24f83dae79785364c46e32afbf46ffac3c163c59054ebebc620d5e namespace=k8s.io Jul 10 01:01:19.064070 env[1248]: time="2025-07-10T01:01:18.807869855Z" level=info msg="cleaning up dead shim" Jul 10 01:01:19.064070 env[1248]: time="2025-07-10T01:01:18.814616216Z" level=warning msg="cleanup warnings time=\"2025-07-10T01:01:18Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5564 runtime=io.containerd.runc.v2\n" Jul 10 01:01:19.064070 env[1248]: time="2025-07-10T01:01:18.815287685Z" level=warning msg="cleanup warnings time=\"2025-07-10T01:01:18Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5568 runtime=io.containerd.runc.v2\n" Jul 10 01:01:18.788530 systemd[1]: cri-containerd-5bf0a0cb3e24f83dae79785364c46e32afbf46ffac3c163c59054ebebc620d5e.scope: Consumed 2.696s CPU time. Jul 10 01:01:18.794244 systemd[1]: cri-containerd-663c36b4eded040db8a2cde1c98e6c2b557e9979d922675973e996efd7ffa3bc.scope: Deactivated successfully. Jul 10 01:01:18.794406 systemd[1]: cri-containerd-663c36b4eded040db8a2cde1c98e6c2b557e9979d922675973e996efd7ffa3bc.scope: Consumed 4.540s CPU time. Jul 10 01:01:18.837642 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-663c36b4eded040db8a2cde1c98e6c2b557e9979d922675973e996efd7ffa3bc-rootfs.mount: Deactivated successfully. Jul 10 01:01:18.837735 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5bf0a0cb3e24f83dae79785364c46e32afbf46ffac3c163c59054ebebc620d5e-rootfs.mount: Deactivated successfully. Jul 10 01:01:19.300236 systemd[1]: cri-containerd-f979f954dc4b621d38be74a1ddaf7f8bbb36a54a0054a5d4872d99e28d86033b.scope: Deactivated successfully. Jul 10 01:01:19.303000 audit: BPF prog-id=81 op=UNLOAD Jul 10 01:01:19.303000 audit: BPF prog-id=100 op=UNLOAD Jul 10 01:01:19.300419 systemd[1]: cri-containerd-f979f954dc4b621d38be74a1ddaf7f8bbb36a54a0054a5d4872d99e28d86033b.scope: Consumed 1.451s CPU time. Jul 10 01:01:19.349666 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f979f954dc4b621d38be74a1ddaf7f8bbb36a54a0054a5d4872d99e28d86033b-rootfs.mount: Deactivated successfully. Jul 10 01:01:19.353669 env[1248]: time="2025-07-10T01:01:19.352918059Z" level=info msg="shim disconnected" id=f979f954dc4b621d38be74a1ddaf7f8bbb36a54a0054a5d4872d99e28d86033b Jul 10 01:01:19.353669 env[1248]: time="2025-07-10T01:01:19.352971122Z" level=warning msg="cleaning up after shim disconnected" id=f979f954dc4b621d38be74a1ddaf7f8bbb36a54a0054a5d4872d99e28d86033b namespace=k8s.io Jul 10 01:01:19.353669 env[1248]: time="2025-07-10T01:01:19.352979852Z" level=info msg="cleaning up dead shim" Jul 10 01:01:19.360921 env[1248]: time="2025-07-10T01:01:19.360882245Z" level=warning msg="cleanup warnings time=\"2025-07-10T01:01:19Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5608 runtime=io.containerd.runc.v2\n" Jul 10 01:01:20.506197 update_engine[1241]: I0710 01:01:20.501104 1241 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Jul 10 01:01:20.506197 update_engine[1241]: I0710 01:01:20.506155 1241 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Jul 10 01:01:20.542345 update_engine[1241]: I0710 01:01:20.542279 1241 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Jul 10 01:01:20.550814 update_engine[1241]: I0710 01:01:20.550747 1241 omaha_request_params.cc:62] Current group set to lts Jul 10 01:01:20.555757 update_engine[1241]: I0710 01:01:20.555624 1241 update_attempter.cc:499] Already updated boot flags. Skipping. Jul 10 01:01:20.555757 update_engine[1241]: I0710 01:01:20.555637 1241 update_attempter.cc:643] Scheduling an action processor start. Jul 10 01:01:20.555757 update_engine[1241]: I0710 01:01:20.555651 1241 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Jul 10 01:01:20.557227 update_engine[1241]: I0710 01:01:20.557128 1241 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Jul 10 01:01:20.557227 update_engine[1241]: I0710 01:01:20.557191 1241 omaha_request_action.cc:270] Posting an Omaha request to disabled Jul 10 01:01:20.557227 update_engine[1241]: I0710 01:01:20.557196 1241 omaha_request_action.cc:271] Request: Jul 10 01:01:20.557227 update_engine[1241]: Jul 10 01:01:20.557227 update_engine[1241]: Jul 10 01:01:20.557227 update_engine[1241]: Jul 10 01:01:20.557227 update_engine[1241]: Jul 10 01:01:20.557227 update_engine[1241]: Jul 10 01:01:20.557227 update_engine[1241]: Jul 10 01:01:20.557227 update_engine[1241]: Jul 10 01:01:20.557227 update_engine[1241]: Jul 10 01:01:20.557227 update_engine[1241]: I0710 01:01:20.557199 1241 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 10 01:01:20.621988 update_engine[1241]: I0710 01:01:20.621942 1241 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 10 01:01:20.625855 update_engine[1241]: E0710 01:01:20.625823 1241 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 10 01:01:20.625979 update_engine[1241]: I0710 01:01:20.625926 1241 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Jul 10 01:01:20.671066 locksmithd[1293]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Jul 10 01:01:20.994443 kernel: kauditd_printk_skb: 8 callbacks suppressed Jul 10 01:01:21.005263 kernel: audit: type=1400 audit(1752109280.993:1586): avc: denied { watch } for pid=4837 comm="apiserver" path="/calico-apiserver-certs/..2025_07_10_00_58_42.1504779381/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c175 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c39,c175 tclass=file permissive=0 Jul 10 01:01:21.005344 kernel: audit: type=1300 audit(1752109280.993:1586): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001e8c020 a2=fc6 a3=0 items=0 ppid=4413 pid=4837 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c175 key=(null) Jul 10 01:01:21.005380 kernel: audit: type=1327 audit(1752109280.993:1586): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 10 01:01:20.993000 audit[4837]: AVC avc: denied { watch } for pid=4837 comm="apiserver" path="/calico-apiserver-certs/..2025_07_10_00_58_42.1504779381/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c175 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c39,c175 tclass=file permissive=0 Jul 10 01:01:20.993000 audit[4837]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001e8c020 a2=fc6 a3=0 items=0 ppid=4413 pid=4837 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c175 key=(null) Jul 10 01:01:20.993000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 10 01:01:22.047364 sshd[5420]: pam_unix(sshd:session): session closed for user core Jul 10 01:01:22.050116 systemd[1]: Started sshd@15-139.178.70.109:22-139.178.68.195:58984.service. Jul 10 01:01:22.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.109:22-139.178.68.195:58984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:22.058747 kernel: audit: type=1130 audit(1752109282.051:1587): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.109:22-139.178.68.195:58984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:22.088000 audit[5420]: USER_END pid=5420 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:22.092000 audit[5420]: CRED_DISP pid=5420 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:22.095879 kernel: audit: type=1106 audit(1752109282.088:1588): pid=5420 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:22.095921 kernel: audit: type=1104 audit(1752109282.092:1589): pid=5420 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:22.105978 systemd[1]: sshd@13-139.178.70.109:22-139.178.68.195:39410.service: Deactivated successfully. Jul 10 01:01:22.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.109:22-139.178.68.195:39410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:22.109626 systemd[1]: session-13.scope: Deactivated successfully. Jul 10 01:01:22.109691 systemd-logind[1239]: Session 13 logged out. Waiting for processes to exit. Jul 10 01:01:22.109729 systemd[1]: session-13.scope: Consumed 14.074s CPU time. Jul 10 01:01:22.110347 kernel: audit: type=1131 audit(1752109282.105:1590): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.109:22-139.178.68.195:39410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:22.110895 systemd-logind[1239]: Removed session 13. Jul 10 01:01:22.219000 audit[5625]: USER_ACCT pid=5625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:22.220563 sshd[5625]: Accepted publickey for core from 139.178.68.195 port 58984 ssh2: RSA SHA256:NVpdRDPpwzjVTzi6orhe1cA9BvcYymCSReGH8myOy/Q Jul 10 01:01:22.222000 audit[5625]: CRED_ACQ pid=5625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:22.226343 kernel: audit: type=1101 audit(1752109282.219:1591): pid=5625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:22.226378 kernel: audit: type=1103 audit(1752109282.222:1592): pid=5625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:22.226397 kernel: audit: type=1006 audit(1752109282.224:1593): pid=5625 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Jul 10 01:01:22.224000 audit[5625]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff56a455e0 a2=3 a3=0 items=0 ppid=1 pid=5625 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:22.224000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 01:01:22.239256 sshd[5625]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 01:01:22.301885 systemd-logind[1239]: New session 14 of user core. Jul 10 01:01:22.302410 systemd[1]: Started session-14.scope. Jul 10 01:01:22.308000 audit[5625]: USER_START pid=5625 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:22.309000 audit[5628]: CRED_ACQ pid=5628 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:22.435925 kubelet[2097]: E0710 01:00:48.796900 2097 kubelet.go:2573] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1m4.276s" Jul 10 01:01:22.616812 kubelet[2097]: W0710 01:01:21.663064 2097 watcher.go:93] Error while processing event ("/sys/fs/cgroup/system.slice/system-sshd.slice/sshd@14-139.178.70.109:22-218.78.46.81:52535.service": 0x40000100 == IN_CREATE|IN_ISDIR): inotify_add_watch /sys/fs/cgroup/system.slice/system-sshd.slice/sshd@14-139.178.70.109:22-218.78.46.81:52535.service: no such file or directory Jul 10 01:01:22.769165 env[1248]: time="2025-07-10T01:01:22.767387069Z" level=info msg="RemovePodSandbox for \"74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051\"" Jul 10 01:01:22.769165 env[1248]: time="2025-07-10T01:01:22.767422820Z" level=info msg="Forcibly stopping sandbox \"74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051\"" Jul 10 01:01:22.810621 kubelet[2097]: E0710 01:01:22.810593 2097 goroutinemap.go:150] Operation for "/var/lib/kubelet/plugins_registry/csi.tigera.io-reg.sock" failed. No retries permitted until 2025-07-10 01:01:26.800456547 +0000 UTC m=+194.549854200 (durationBeforeRetry 4s). Error: RegisterPlugin error -- dial failed at socket /var/lib/kubelet/plugins_registry/csi.tigera.io-reg.sock, err: failed to dial socket /var/lib/kubelet/plugins_registry/csi.tigera.io-reg.sock, err: context deadline exceeded Jul 10 01:01:22.820007 kubelet[2097]: E0710 01:01:22.818313 2097 kubelet.go:2406] "Skipping pod synchronization" err="container runtime is down" Jul 10 01:01:22.837290 systemd[1]: run-containerd-runc-k8s.io-43baae38fde8959029f4a4ed2b5e8e9d1db5126c498892382179bddb7a08b550-runc.ZJstXd.mount: Deactivated successfully. Jul 10 01:01:22.853316 kubelet[2097]: W0710 01:01:22.851495 2097 logging.go:55] [core] [Channel #23 SubChannel #24]grpc: addrConn.createTransport failed to connect to {Addr: "/var/lib/kubelet/plugins_registry/csi.tigera.io-reg.sock", ServerName: "%2Fvar%2Flib%2Fkubelet%2Fplugins_registry%2Fcsi.tigera.io-reg.sock", }. Err: connection error: desc = "error reading server preface: read unix @->/registration/csi.tigera.io-reg.sock: use of closed network connection" Jul 10 01:01:22.940616 kubelet[2097]: E0710 01:01:22.940547 2097 kubelet.go:2406] "Skipping pod synchronization" err="container runtime is down" Jul 10 01:01:23.175034 env[1248]: time="2025-07-10T01:01:23.174612927Z" level=info msg="StopContainer for \"a4124f167ef32428fc7c8ae89608ca57236eb60a85d3f8458f5afdb67df965ff\" with timeout 30 (s)" Jul 10 01:01:23.190588 env[1248]: time="2025-07-10T01:01:23.190546165Z" level=info msg="Stop container \"a4124f167ef32428fc7c8ae89608ca57236eb60a85d3f8458f5afdb67df965ff\" with signal terminated" Jul 10 01:01:23.207000 audit: BPF prog-id=232 op=UNLOAD Jul 10 01:01:23.225000 audit[5625]: USER_END pid=5625 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:23.225000 audit[5625]: CRED_DISP pid=5625 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:23.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.109:22-139.178.68.195:58984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:23.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.109:22-139.178.68.195:58998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:23.243000 audit: BPF prog-id=235 op=UNLOAD Jul 10 01:01:23.207458 systemd[1]: cri-containerd-a4124f167ef32428fc7c8ae89608ca57236eb60a85d3f8458f5afdb67df965ff.scope: Deactivated successfully. Jul 10 01:01:23.224944 sshd[5625]: pam_unix(sshd:session): session closed for user core Jul 10 01:01:23.272350 env[1248]: time="2025-07-10T01:01:23.262836499Z" level=info msg="shim disconnected" id=a4124f167ef32428fc7c8ae89608ca57236eb60a85d3f8458f5afdb67df965ff Jul 10 01:01:23.272350 env[1248]: time="2025-07-10T01:01:23.262863378Z" level=warning msg="cleaning up after shim disconnected" id=a4124f167ef32428fc7c8ae89608ca57236eb60a85d3f8458f5afdb67df965ff namespace=k8s.io Jul 10 01:01:23.272350 env[1248]: time="2025-07-10T01:01:23.262869111Z" level=info msg="cleaning up dead shim" Jul 10 01:01:23.272350 env[1248]: time="2025-07-10T01:01:23.271004398Z" level=warning msg="cleanup warnings time=\"2025-07-10T01:01:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5771 runtime=io.containerd.runc.v2\n" Jul 10 01:01:23.231648 systemd[1]: sshd@15-139.178.70.109:22-139.178.68.195:58984.service: Deactivated successfully. Jul 10 01:01:23.232110 systemd[1]: session-14.scope: Deactivated successfully. Jul 10 01:01:23.232680 systemd-logind[1239]: Session 14 logged out. Waiting for processes to exit. Jul 10 01:01:23.239734 systemd[1]: Started sshd@16-139.178.70.109:22-139.178.68.195:58998.service. Jul 10 01:01:23.241563 systemd-logind[1239]: Removed session 14. Jul 10 01:01:23.284080 env[1248]: time="2025-07-10T01:01:23.284055371Z" level=info msg="StopContainer for \"a4124f167ef32428fc7c8ae89608ca57236eb60a85d3f8458f5afdb67df965ff\" returns successfully" Jul 10 01:01:23.350071 env[1248]: time="2025-07-10T01:01:23.349367832Z" level=info msg="StopPodSandbox for \"58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa\"" Jul 10 01:01:23.350071 env[1248]: time="2025-07-10T01:01:23.349910977Z" level=info msg="Container to stop \"a4124f167ef32428fc7c8ae89608ca57236eb60a85d3f8458f5afdb67df965ff\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Jul 10 01:01:23.370184 systemd[1]: cri-containerd-58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa.scope: Deactivated successfully. Jul 10 01:01:23.370000 audit: BPF prog-id=201 op=UNLOAD Jul 10 01:01:23.374000 audit: BPF prog-id=204 op=UNLOAD Jul 10 01:01:23.423647 env[1248]: time="2025-07-10T01:01:23.423614923Z" level=info msg="shim disconnected" id=58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa Jul 10 01:01:23.424242 env[1248]: time="2025-07-10T01:01:23.424226848Z" level=warning msg="cleaning up after shim disconnected" id=58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa namespace=k8s.io Jul 10 01:01:23.424355 env[1248]: time="2025-07-10T01:01:23.424345091Z" level=info msg="cleaning up dead shim" Jul 10 01:01:23.436624 env[1248]: time="2025-07-10T01:01:23.436589252Z" level=warning msg="cleanup warnings time=\"2025-07-10T01:01:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5819 runtime=io.containerd.runc.v2\n" Jul 10 01:01:23.523000 audit[5766]: USER_ACCT pid=5766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:23.532318 sshd[5766]: Accepted publickey for core from 139.178.68.195 port 58998 ssh2: RSA SHA256:NVpdRDPpwzjVTzi6orhe1cA9BvcYymCSReGH8myOy/Q Jul 10 01:01:23.570000 audit[5766]: CRED_ACQ pid=5766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:23.572000 audit[5766]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9b19e1f0 a2=3 a3=0 items=0 ppid=1 pid=5766 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:23.572000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 01:01:23.581089 sshd[5766]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 01:01:23.617796 systemd-logind[1239]: New session 15 of user core. Jul 10 01:01:23.618479 systemd[1]: Started session-15.scope. Jul 10 01:01:23.634000 audit[5766]: USER_START pid=5766 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:23.637000 audit[5853]: CRED_ACQ pid=5853 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:23.831109 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a4124f167ef32428fc7c8ae89608ca57236eb60a85d3f8458f5afdb67df965ff-rootfs.mount: Deactivated successfully. Jul 10 01:01:23.831187 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa-rootfs.mount: Deactivated successfully. Jul 10 01:01:23.831227 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa-shm.mount: Deactivated successfully. Jul 10 01:01:23.845756 env[1248]: time="2025-07-10T01:01:23.845633405Z" level=info msg="CreateContainer within sandbox \"9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 10 01:01:23.865450 systemd-networkd[1059]: cali0c5a612c4ad: Link DOWN Jul 10 01:01:23.865455 systemd-networkd[1059]: cali0c5a612c4ad: Lost carrier Jul 10 01:01:23.955731 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2875047903.mount: Deactivated successfully. Jul 10 01:01:23.971143 env[1248]: time="2025-07-10T01:01:23.971092894Z" level=info msg="CreateContainer within sandbox \"9da68a93a0b7640ec88a80a67d2f643f637f045166db9ae9d9c885c65178f5c3\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"054cdd569d5741b30b5ad5475c32b1ebfc63a3740bbdb279f2d5721621676b97\"" Jul 10 01:01:24.284000 audit[5876]: NETFILTER_CFG table=filter:137 family=2 entries=59 op=nft_register_rule pid=5876 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 01:01:24.284000 audit[5876]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7ffcabdcf580 a2=0 a3=7ffcabdcf56c items=0 ppid=3380 pid=5876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:24.284000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 01:01:24.285000 audit[5876]: NETFILTER_CFG table=filter:138 family=2 entries=2 op=nft_unregister_chain pid=5876 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 01:01:24.285000 audit[5876]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffcabdcf580 a2=0 a3=55f61ec94000 items=0 ppid=3380 pid=5876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:24.285000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 01:01:24.789825 env[1248]: 2025-07-10 01:01:23.733 [WARNING][5680] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--768f4c5c69--6bh96-eth0", GenerateName:"goldmane-768f4c5c69-", Namespace:"calico-system", SelfLink:"", UID:"dfc77fd4-c756-489e-a5e3-3692e4542650", ResourceVersion:"1101", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"768f4c5c69", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bc4df319578078352933ca243e2180522528e9f36a9c9da9606e808b3787513d", Pod:"goldmane-768f4c5c69-6bh96", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali2d2672c812b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 01:01:24.789825 env[1248]: 2025-07-10 01:01:23.753 [INFO][5680] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" Jul 10 01:01:24.789825 env[1248]: 2025-07-10 01:01:23.753 [INFO][5680] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" iface="eth0" netns="" Jul 10 01:01:24.789825 env[1248]: 2025-07-10 01:01:23.754 [INFO][5680] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" Jul 10 01:01:24.789825 env[1248]: 2025-07-10 01:01:23.754 [INFO][5680] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" Jul 10 01:01:24.789825 env[1248]: 2025-07-10 01:01:24.382 [INFO][5858] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" HandleID="k8s-pod-network.74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" Workload="localhost-k8s-goldmane--768f4c5c69--6bh96-eth0" Jul 10 01:01:24.789825 env[1248]: 2025-07-10 01:01:24.389 [INFO][5858] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 01:01:24.789825 env[1248]: 2025-07-10 01:01:24.748 [INFO][5858] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 01:01:24.789825 env[1248]: 2025-07-10 01:01:24.754 [WARNING][5858] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" HandleID="k8s-pod-network.74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" Workload="localhost-k8s-goldmane--768f4c5c69--6bh96-eth0" Jul 10 01:01:24.789825 env[1248]: 2025-07-10 01:01:24.754 [INFO][5858] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" HandleID="k8s-pod-network.74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" Workload="localhost-k8s-goldmane--768f4c5c69--6bh96-eth0" Jul 10 01:01:24.789825 env[1248]: 2025-07-10 01:01:24.758 [INFO][5858] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 01:01:24.789825 env[1248]: 2025-07-10 01:01:24.769 [INFO][5680] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051" Jul 10 01:01:24.831943 env[1248]: time="2025-07-10T01:01:24.790011994Z" level=info msg="TearDown network for sandbox \"74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051\" successfully" Jul 10 01:01:24.831943 env[1248]: 2025-07-10 01:01:23.814 [INFO][5849] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" Jul 10 01:01:24.831943 env[1248]: 2025-07-10 01:01:23.814 [INFO][5849] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" iface="eth0" netns="/var/run/netns/cni-08af4ead-1389-050f-13d3-3dd9ee0fc57b" Jul 10 01:01:24.831943 env[1248]: 2025-07-10 01:01:23.814 [INFO][5849] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" iface="eth0" netns="/var/run/netns/cni-08af4ead-1389-050f-13d3-3dd9ee0fc57b" Jul 10 01:01:24.831943 env[1248]: 2025-07-10 01:01:23.835 [INFO][5849] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" after=20.794071ms iface="eth0" netns="/var/run/netns/cni-08af4ead-1389-050f-13d3-3dd9ee0fc57b" Jul 10 01:01:24.831943 env[1248]: 2025-07-10 01:01:23.835 [INFO][5849] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" Jul 10 01:01:24.831943 env[1248]: 2025-07-10 01:01:23.835 [INFO][5849] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" Jul 10 01:01:24.831943 env[1248]: 2025-07-10 01:01:24.382 [INFO][5863] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" HandleID="k8s-pod-network.58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0" Jul 10 01:01:24.831943 env[1248]: 2025-07-10 01:01:24.389 [INFO][5863] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 01:01:24.831943 env[1248]: 2025-07-10 01:01:24.389 [INFO][5863] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 01:01:24.831943 env[1248]: 2025-07-10 01:01:24.743 [INFO][5863] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" HandleID="k8s-pod-network.58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0" Jul 10 01:01:24.831943 env[1248]: 2025-07-10 01:01:24.743 [INFO][5863] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" HandleID="k8s-pod-network.58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--2wnxd-eth0" Jul 10 01:01:24.831943 env[1248]: 2025-07-10 01:01:24.748 [INFO][5863] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 01:01:24.831943 env[1248]: 2025-07-10 01:01:24.769 [INFO][5849] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa" Jul 10 01:01:24.831943 env[1248]: time="2025-07-10T01:01:24.795079365Z" level=info msg="TearDown network for sandbox \"58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa\" successfully" Jul 10 01:01:24.831943 env[1248]: time="2025-07-10T01:01:24.795112664Z" level=info msg="StopPodSandbox for \"58c3b9acff028cc6b382ddf18f1bde8b4aef44766a55da96f3f5828f8bca77aa\" returns successfully" Jul 10 01:01:24.831943 env[1248]: time="2025-07-10T01:01:24.801184490Z" level=info msg="RemovePodSandbox \"74f86a3c4c982da671471f7e05c29dc5482e90c53752b68002316237bf42b051\" returns successfully" Jul 10 01:01:24.814949 systemd[1]: run-netns-cni\x2d08af4ead\x2d1389\x2d050f\x2d13d3\x2d3dd9ee0fc57b.mount: Deactivated successfully. Jul 10 01:01:24.841066 systemd[1]: run-containerd-runc-k8s.io-43baae38fde8959029f4a4ed2b5e8e9d1db5126c498892382179bddb7a08b550-runc.WaDu9K.mount: Deactivated successfully. Jul 10 01:01:24.980562 env[1248]: time="2025-07-10T01:01:24.980247076Z" level=info msg="StartContainer for \"054cdd569d5741b30b5ad5475c32b1ebfc63a3740bbdb279f2d5721621676b97\"" Jul 10 01:01:25.057071 systemd[1]: Started cri-containerd-054cdd569d5741b30b5ad5475c32b1ebfc63a3740bbdb279f2d5721621676b97.scope. Jul 10 01:01:25.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.073000 audit: BPF prog-id=243 op=LOAD Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { bpf } for pid=5954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=5487 pid=5954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:25.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035346364643536396435373431623330623561643534373563333262 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { perfmon } for pid=5954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=5487 pid=5954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:25.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035346364643536396435373431623330623561643534373563333262 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { bpf } for pid=5954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { bpf } for pid=5954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { bpf } for pid=5954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { perfmon } for pid=5954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { perfmon } for pid=5954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { perfmon } for pid=5954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { perfmon } for pid=5954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { perfmon } for pid=5954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { bpf } for pid=5954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { bpf } for pid=5954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit: BPF prog-id=244 op=LOAD Jul 10 01:01:25.074000 audit[5954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000280460 items=0 ppid=5487 pid=5954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:25.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035346364643536396435373431623330623561643534373563333262 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { bpf } for pid=5954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { bpf } for pid=5954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { perfmon } for pid=5954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { perfmon } for pid=5954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { perfmon } for pid=5954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { perfmon } for pid=5954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { perfmon } for pid=5954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { bpf } for pid=5954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { bpf } for pid=5954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit: BPF prog-id=245 op=LOAD Jul 10 01:01:25.074000 audit[5954]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002804a8 items=0 ppid=5487 pid=5954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:25.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035346364643536396435373431623330623561643534373563333262 Jul 10 01:01:25.074000 audit: BPF prog-id=245 op=UNLOAD Jul 10 01:01:25.074000 audit: BPF prog-id=244 op=UNLOAD Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { bpf } for pid=5954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { bpf } for pid=5954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { bpf } for pid=5954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { perfmon } for pid=5954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { perfmon } for pid=5954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { perfmon } for pid=5954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { perfmon } for pid=5954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { perfmon } for pid=5954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { bpf } for pid=5954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit[5954]: AVC avc: denied { bpf } for pid=5954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:25.074000 audit: BPF prog-id=246 op=LOAD Jul 10 01:01:25.074000 audit[5954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002808b8 items=0 ppid=5487 pid=5954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:25.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035346364643536396435373431623330623561643534373563333262 Jul 10 01:01:25.125319 env[1248]: time="2025-07-10T01:01:25.107118067Z" level=info msg="StartContainer for \"054cdd569d5741b30b5ad5475c32b1ebfc63a3740bbdb279f2d5721621676b97\" returns successfully" Jul 10 01:01:25.246527 env[1248]: time="2025-07-10T01:01:25.244325052Z" level=info msg="StopPodSandbox for \"76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b\"" Jul 10 01:01:25.277625 kubelet[2097]: E0710 01:01:25.273711 2097 kubelet.go:2573] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.989s" Jul 10 01:01:25.907732 systemd[1]: run-containerd-runc-k8s.io-43baae38fde8959029f4a4ed2b5e8e9d1db5126c498892382179bddb7a08b550-runc.OH0eMF.mount: Deactivated successfully. Jul 10 01:01:26.913907 sshd[5766]: pam_unix(sshd:session): session closed for user core Jul 10 01:01:26.979582 kernel: kauditd_printk_skb: 82 callbacks suppressed Jul 10 01:01:26.988627 kernel: audit: type=1130 audit(1752109286.953:1629): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.109:22-139.178.68.195:59008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:26.990718 kernel: audit: type=1106 audit(1752109286.970:1630): pid=5766 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:26.990776 kernel: audit: type=1104 audit(1752109286.975:1631): pid=5766 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:26.991430 kernel: audit: type=1131 audit(1752109286.982:1632): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.109:22-139.178.68.195:58998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:26.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.109:22-139.178.68.195:59008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:26.970000 audit[5766]: USER_END pid=5766 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:26.975000 audit[5766]: CRED_DISP pid=5766 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:26.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.109:22-139.178.68.195:58998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:26.947847 systemd[1]: Started sshd@17-139.178.70.109:22-139.178.68.195:59008.service. Jul 10 01:01:27.018574 env[1248]: 2025-07-10 01:01:26.135 [WARNING][5988] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--b47q7-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"1d40f785-0a7b-4a11-9275-67e6b3486e34", ResourceVersion:"963", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e", Pod:"coredns-668d6bf9bc-b47q7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali773531f53f6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 01:01:27.018574 env[1248]: 2025-07-10 01:01:26.152 [INFO][5988] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" Jul 10 01:01:27.018574 env[1248]: 2025-07-10 01:01:26.152 [INFO][5988] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" iface="eth0" netns="" Jul 10 01:01:27.018574 env[1248]: 2025-07-10 01:01:26.152 [INFO][5988] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" Jul 10 01:01:27.018574 env[1248]: 2025-07-10 01:01:26.152 [INFO][5988] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" Jul 10 01:01:27.018574 env[1248]: 2025-07-10 01:01:26.735 [INFO][5999] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" HandleID="k8s-pod-network.76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" Workload="localhost-k8s-coredns--668d6bf9bc--b47q7-eth0" Jul 10 01:01:27.018574 env[1248]: 2025-07-10 01:01:26.759 [INFO][5999] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 01:01:27.018574 env[1248]: 2025-07-10 01:01:26.764 [INFO][5999] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 01:01:27.018574 env[1248]: 2025-07-10 01:01:26.885 [WARNING][5999] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" HandleID="k8s-pod-network.76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" Workload="localhost-k8s-coredns--668d6bf9bc--b47q7-eth0" Jul 10 01:01:27.018574 env[1248]: 2025-07-10 01:01:26.885 [INFO][5999] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" HandleID="k8s-pod-network.76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" Workload="localhost-k8s-coredns--668d6bf9bc--b47q7-eth0" Jul 10 01:01:27.018574 env[1248]: 2025-07-10 01:01:26.888 [INFO][5999] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 01:01:27.018574 env[1248]: 2025-07-10 01:01:26.898 [INFO][5988] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" Jul 10 01:01:27.018574 env[1248]: time="2025-07-10T01:01:26.920553344Z" level=info msg="TearDown network for sandbox \"76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b\" successfully" Jul 10 01:01:27.018574 env[1248]: time="2025-07-10T01:01:26.920574791Z" level=info msg="StopPodSandbox for \"76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b\" returns successfully" Jul 10 01:01:26.982252 systemd[1]: sshd@16-139.178.70.109:22-139.178.68.195:58998.service: Deactivated successfully. Jul 10 01:01:26.983278 systemd[1]: session-15.scope: Deactivated successfully. Jul 10 01:01:26.983736 systemd-logind[1239]: Session 15 logged out. Waiting for processes to exit. Jul 10 01:01:26.986947 systemd-logind[1239]: Removed session 15. Jul 10 01:01:27.045000 audit[6016]: NETFILTER_CFG table=filter:139 family=2 entries=22 op=nft_register_rule pid=6016 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:01:27.067076 kernel: audit: type=1325 audit(1752109287.045:1633): table=filter:139 family=2 entries=22 op=nft_register_rule pid=6016 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:01:27.067144 kernel: audit: type=1300 audit(1752109287.045:1633): arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffff689c640 a2=0 a3=7ffff689c62c items=0 ppid=2201 pid=6016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:27.067165 kernel: audit: type=1327 audit(1752109287.045:1633): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:01:27.067182 kernel: audit: type=1325 audit(1752109287.056:1634): table=nat:140 family=2 entries=24 op=nft_register_rule pid=6016 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:01:27.067258 kernel: audit: type=1300 audit(1752109287.056:1634): arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffff689c640 a2=0 a3=0 items=0 ppid=2201 pid=6016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:27.067277 kernel: audit: type=1327 audit(1752109287.056:1634): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:01:27.045000 audit[6016]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffff689c640 a2=0 a3=7ffff689c62c items=0 ppid=2201 pid=6016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:27.045000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:01:27.056000 audit[6016]: NETFILTER_CFG table=nat:140 family=2 entries=24 op=nft_register_rule pid=6016 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:01:27.056000 audit[6016]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffff689c640 a2=0 a3=0 items=0 ppid=2201 pid=6016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:27.056000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:01:27.094000 audit[6013]: USER_ACCT pid=6013 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:27.094736 sshd[6013]: Accepted publickey for core from 139.178.68.195 port 59008 ssh2: RSA SHA256:NVpdRDPpwzjVTzi6orhe1cA9BvcYymCSReGH8myOy/Q Jul 10 01:01:27.095000 audit[6013]: CRED_ACQ pid=6013 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:27.095000 audit[6013]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc98e9e1c0 a2=3 a3=0 items=0 ppid=1 pid=6013 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:27.095000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 01:01:27.097963 sshd[6013]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 01:01:27.126521 systemd[1]: Started session-16.scope. Jul 10 01:01:27.127502 systemd-logind[1239]: New session 16 of user core. Jul 10 01:01:27.133000 audit[6013]: USER_START pid=6013 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:27.134000 audit[6017]: CRED_ACQ pid=6017 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:27.137744 kubelet[2097]: E0710 01:01:26.945045 2097 kubelet.go:2573] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.199s" Jul 10 01:01:27.248568 env[1248]: time="2025-07-10T01:01:27.248264391Z" level=info msg="RemovePodSandbox for \"76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b\"" Jul 10 01:01:27.248568 env[1248]: time="2025-07-10T01:01:27.248294423Z" level=info msg="Forcibly stopping sandbox \"76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b\"" Jul 10 01:01:27.949365 kubelet[2097]: I0710 01:01:27.944736 2097 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 10 01:01:28.012516 env[1248]: 2025-07-10 01:01:27.686 [WARNING][6028] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--b47q7-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"1d40f785-0a7b-4a11-9275-67e6b3486e34", ResourceVersion:"963", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 58, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d9625a2304e76903b0576823d64b63e66e81e4a55870c647e41d1a7816d9cb0e", Pod:"coredns-668d6bf9bc-b47q7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali773531f53f6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 01:01:28.012516 env[1248]: 2025-07-10 01:01:27.689 [INFO][6028] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" Jul 10 01:01:28.012516 env[1248]: 2025-07-10 01:01:27.689 [INFO][6028] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" iface="eth0" netns="" Jul 10 01:01:28.012516 env[1248]: 2025-07-10 01:01:27.689 [INFO][6028] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" Jul 10 01:01:28.012516 env[1248]: 2025-07-10 01:01:27.689 [INFO][6028] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" Jul 10 01:01:28.012516 env[1248]: 2025-07-10 01:01:27.976 [INFO][6038] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" HandleID="k8s-pod-network.76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" Workload="localhost-k8s-coredns--668d6bf9bc--b47q7-eth0" Jul 10 01:01:28.012516 env[1248]: 2025-07-10 01:01:27.982 [INFO][6038] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 01:01:28.012516 env[1248]: 2025-07-10 01:01:27.984 [INFO][6038] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 01:01:28.012516 env[1248]: 2025-07-10 01:01:28.004 [WARNING][6038] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" HandleID="k8s-pod-network.76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" Workload="localhost-k8s-coredns--668d6bf9bc--b47q7-eth0" Jul 10 01:01:28.012516 env[1248]: 2025-07-10 01:01:28.004 [INFO][6038] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" HandleID="k8s-pod-network.76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" Workload="localhost-k8s-coredns--668d6bf9bc--b47q7-eth0" Jul 10 01:01:28.012516 env[1248]: 2025-07-10 01:01:28.009 [INFO][6038] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 01:01:28.012516 env[1248]: 2025-07-10 01:01:28.011 [INFO][6028] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b" Jul 10 01:01:28.016598 env[1248]: time="2025-07-10T01:01:28.012651595Z" level=info msg="TearDown network for sandbox \"76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b\" successfully" Jul 10 01:01:28.025018 env[1248]: time="2025-07-10T01:01:28.024986924Z" level=info msg="RemovePodSandbox \"76ce43835748d040c53641e27f9a9a3a2a6917716b8183123fa2afcbc3c4240b\" returns successfully" Jul 10 01:01:28.196049 kubelet[2097]: I0710 01:01:28.196027 2097 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 10 01:01:28.410527 kubelet[2097]: I0710 01:01:28.410497 2097 scope.go:117] "RemoveContainer" containerID="5bf0a0cb3e24f83dae79785364c46e32afbf46ffac3c163c59054ebebc620d5e" Jul 10 01:01:28.518123 kubelet[2097]: I0710 01:01:28.518090 2097 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e40791bb-1dd3-4f13-a751-d75795ef4c90-calico-apiserver-certs\") pod \"e40791bb-1dd3-4f13-a751-d75795ef4c90\" (UID: \"e40791bb-1dd3-4f13-a751-d75795ef4c90\") " Jul 10 01:01:28.518293 kubelet[2097]: I0710 01:01:28.518151 2097 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-c2r4f\" (UniqueName: \"kubernetes.io/projected/e40791bb-1dd3-4f13-a751-d75795ef4c90-kube-api-access-c2r4f\") pod \"e40791bb-1dd3-4f13-a751-d75795ef4c90\" (UID: \"e40791bb-1dd3-4f13-a751-d75795ef4c90\") " Jul 10 01:01:28.544000 audit[5963]: AVC avc: denied { watch } for pid=5963 comm="apiserver" path="/calico-apiserver-certs/..2025_07_10_01_00_17.2138663860/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c763,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c763,c995 tclass=file permissive=0 Jul 10 01:01:28.544000 audit[5963]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f6c520 a2=fc6 a3=0 items=0 ppid=5487 pid=5963 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c763,c995 key=(null) Jul 10 01:01:28.544000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 10 01:01:28.957043 systemd[1]: var-lib-kubelet-pods-e40791bb\x2d1dd3\x2d4f13\x2da751\x2dd75795ef4c90-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dc2r4f.mount: Deactivated successfully. Jul 10 01:01:28.957166 systemd[1]: var-lib-kubelet-pods-e40791bb\x2d1dd3\x2d4f13\x2da751\x2dd75795ef4c90-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. Jul 10 01:01:29.129171 kubelet[2097]: I0710 01:01:29.129119 2097 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/e40791bb-1dd3-4f13-a751-d75795ef4c90-kube-api-access-c2r4f" (OuterVolumeSpecName: "kube-api-access-c2r4f") pod "e40791bb-1dd3-4f13-a751-d75795ef4c90" (UID: "e40791bb-1dd3-4f13-a751-d75795ef4c90"). InnerVolumeSpecName "kube-api-access-c2r4f". PluginName "kubernetes.io/projected", VolumeGIDValue "" Jul 10 01:01:29.187735 kubelet[2097]: I0710 01:01:29.056253 2097 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/e40791bb-1dd3-4f13-a751-d75795ef4c90-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "e40791bb-1dd3-4f13-a751-d75795ef4c90" (UID: "e40791bb-1dd3-4f13-a751-d75795ef4c90"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" Jul 10 01:01:29.216099 env[1248]: time="2025-07-10T01:01:29.215975043Z" level=info msg="CreateContainer within sandbox \"efbd4005c4f1b50334ba74e45f50a4398a8fa9f463dd15fc1bdba6ee18046ebd\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Jul 10 01:01:29.295960 kubelet[2097]: I0710 01:01:29.295873 2097 reconciler_common.go:299] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e40791bb-1dd3-4f13-a751-d75795ef4c90-calico-apiserver-certs\") on node \"localhost\" DevicePath \"\"" Jul 10 01:01:29.296597 kubelet[2097]: I0710 01:01:29.296585 2097 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-c2r4f\" (UniqueName: \"kubernetes.io/projected/e40791bb-1dd3-4f13-a751-d75795ef4c90-kube-api-access-c2r4f\") on node \"localhost\" DevicePath \"\"" Jul 10 01:01:29.314497 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2948052553.mount: Deactivated successfully. Jul 10 01:01:29.325132 env[1248]: time="2025-07-10T01:01:29.324448273Z" level=info msg="CreateContainer within sandbox \"efbd4005c4f1b50334ba74e45f50a4398a8fa9f463dd15fc1bdba6ee18046ebd\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"ab669fe1904c3647848154fda80c2e01fea6f4bedc563b04a0ac515bf9f3fa71\"" Jul 10 01:01:29.486578 kubelet[2097]: I0710 01:01:29.486490 2097 scope.go:117] "RemoveContainer" containerID="663c36b4eded040db8a2cde1c98e6c2b557e9979d922675973e996efd7ffa3bc" Jul 10 01:01:29.556339 env[1248]: time="2025-07-10T01:01:29.556190377Z" level=info msg="StartContainer for \"ab669fe1904c3647848154fda80c2e01fea6f4bedc563b04a0ac515bf9f3fa71\"" Jul 10 01:01:29.605766 systemd[1]: Started cri-containerd-ab669fe1904c3647848154fda80c2e01fea6f4bedc563b04a0ac515bf9f3fa71.scope. Jul 10 01:01:29.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.616000 audit: BPF prog-id=247 op=LOAD Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { bpf } for pid=6054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1781 pid=6054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:29.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162363639666531393034633336343738343831353466646138306332 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { perfmon } for pid=6054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1781 pid=6054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:29.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162363639666531393034633336343738343831353466646138306332 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { bpf } for pid=6054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { bpf } for pid=6054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { bpf } for pid=6054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { perfmon } for pid=6054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { perfmon } for pid=6054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { perfmon } for pid=6054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { perfmon } for pid=6054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { perfmon } for pid=6054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { bpf } for pid=6054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { bpf } for pid=6054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit: BPF prog-id=248 op=LOAD Jul 10 01:01:29.617000 audit[6054]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001c0440 items=0 ppid=1781 pid=6054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:29.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162363639666531393034633336343738343831353466646138306332 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { bpf } for pid=6054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { bpf } for pid=6054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { perfmon } for pid=6054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { perfmon } for pid=6054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { perfmon } for pid=6054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { perfmon } for pid=6054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { perfmon } for pid=6054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { bpf } for pid=6054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { bpf } for pid=6054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit: BPF prog-id=249 op=LOAD Jul 10 01:01:29.617000 audit[6054]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001c0488 items=0 ppid=1781 pid=6054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:29.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162363639666531393034633336343738343831353466646138306332 Jul 10 01:01:29.617000 audit: BPF prog-id=249 op=UNLOAD Jul 10 01:01:29.617000 audit: BPF prog-id=248 op=UNLOAD Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { bpf } for pid=6054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { bpf } for pid=6054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { bpf } for pid=6054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { perfmon } for pid=6054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { perfmon } for pid=6054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { perfmon } for pid=6054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { perfmon } for pid=6054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { perfmon } for pid=6054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { bpf } for pid=6054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit[6054]: AVC avc: denied { bpf } for pid=6054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.617000 audit: BPF prog-id=250 op=LOAD Jul 10 01:01:29.617000 audit[6054]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001c0898 items=0 ppid=1781 pid=6054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:29.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162363639666531393034633336343738343831353466646138306332 Jul 10 01:01:29.669549 env[1248]: time="2025-07-10T01:01:29.659065804Z" level=info msg="StartContainer for \"ab669fe1904c3647848154fda80c2e01fea6f4bedc563b04a0ac515bf9f3fa71\" returns successfully" Jul 10 01:01:29.852047 env[1248]: time="2025-07-10T01:01:29.851788574Z" level=info msg="CreateContainer within sandbox \"51374a0cd67bd921ec38b2b37b5079330970ab74749cb7509a3f1e470dd12f01\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Jul 10 01:01:29.876283 env[1248]: time="2025-07-10T01:01:29.876255946Z" level=info msg="CreateContainer within sandbox \"51374a0cd67bd921ec38b2b37b5079330970ab74749cb7509a3f1e470dd12f01\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"b06ec7d3e7a6e2cba964c490db73f42857421a3bb2aca26fe82879cc3463b451\"" Jul 10 01:01:29.904860 env[1248]: time="2025-07-10T01:01:29.904720468Z" level=info msg="StartContainer for \"b06ec7d3e7a6e2cba964c490db73f42857421a3bb2aca26fe82879cc3463b451\"" Jul 10 01:01:29.915779 kubelet[2097]: I0710 01:01:29.915756 2097 scope.go:117] "RemoveContainer" containerID="a4124f167ef32428fc7c8ae89608ca57236eb60a85d3f8458f5afdb67df965ff" Jul 10 01:01:29.924440 systemd[1]: Started cri-containerd-b06ec7d3e7a6e2cba964c490db73f42857421a3bb2aca26fe82879cc3463b451.scope. Jul 10 01:01:29.940499 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2406912198.mount: Deactivated successfully. Jul 10 01:01:29.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.948000 audit: BPF prog-id=251 op=LOAD Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { bpf } for pid=6089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2225 pid=6089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:29.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230366563376433653761366532636261393634633439306462373366 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { perfmon } for pid=6089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2225 pid=6089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:29.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230366563376433653761366532636261393634633439306462373366 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { bpf } for pid=6089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { bpf } for pid=6089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { bpf } for pid=6089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { perfmon } for pid=6089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { perfmon } for pid=6089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { perfmon } for pid=6089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { perfmon } for pid=6089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { perfmon } for pid=6089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { bpf } for pid=6089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { bpf } for pid=6089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit: BPF prog-id=252 op=LOAD Jul 10 01:01:29.949000 audit[6089]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002c9b90 items=0 ppid=2225 pid=6089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:29.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230366563376433653761366532636261393634633439306462373366 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { bpf } for pid=6089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { bpf } for pid=6089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { perfmon } for pid=6089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { perfmon } for pid=6089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { perfmon } for pid=6089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { perfmon } for pid=6089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { perfmon } for pid=6089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { bpf } for pid=6089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { bpf } for pid=6089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit: BPF prog-id=253 op=LOAD Jul 10 01:01:29.949000 audit[6089]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002c9bd8 items=0 ppid=2225 pid=6089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:29.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230366563376433653761366532636261393634633439306462373366 Jul 10 01:01:29.949000 audit: BPF prog-id=253 op=UNLOAD Jul 10 01:01:29.949000 audit: BPF prog-id=252 op=UNLOAD Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { bpf } for pid=6089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { bpf } for pid=6089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { bpf } for pid=6089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { perfmon } for pid=6089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { perfmon } for pid=6089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { perfmon } for pid=6089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { perfmon } for pid=6089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { perfmon } for pid=6089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { bpf } for pid=6089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit[6089]: AVC avc: denied { bpf } for pid=6089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:29.949000 audit: BPF prog-id=254 op=LOAD Jul 10 01:01:29.949000 audit[6089]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002c9fe8 items=0 ppid=2225 pid=6089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:29.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230366563376433653761366532636261393634633439306462373366 Jul 10 01:01:29.967915 env[1248]: time="2025-07-10T01:01:29.967884517Z" level=info msg="StartContainer for \"b06ec7d3e7a6e2cba964c490db73f42857421a3bb2aca26fe82879cc3463b451\" returns successfully" Jul 10 01:01:30.251978 systemd[1]: Removed slice kubepods-besteffort-pode40791bb_1dd3_4f13_a751_d75795ef4c90.slice. Jul 10 01:01:30.445289 update_engine[1241]: I0710 01:01:30.441016 1241 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 10 01:01:30.464242 update_engine[1241]: I0710 01:01:30.464174 1241 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 10 01:01:30.464422 update_engine[1241]: E0710 01:01:30.464268 1241 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 10 01:01:30.466864 update_engine[1241]: I0710 01:01:30.466301 1241 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Jul 10 01:01:30.517893 kubelet[2097]: I0710 01:01:30.207847 2097 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-8555b5848b-8zdkn" podStartSLOduration=125.157162915 podStartE2EDuration="2m5.157162915s" podCreationTimestamp="2025-07-10 00:59:25 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-07-10 01:01:29.904504647 +0000 UTC m=+197.653902308" watchObservedRunningTime="2025-07-10 01:01:30.157162915 +0000 UTC m=+197.906560570" Jul 10 01:01:32.139582 env[1248]: time="2025-07-10T01:01:32.139487259Z" level=info msg="RemoveContainer for \"a4124f167ef32428fc7c8ae89608ca57236eb60a85d3f8458f5afdb67df965ff\"" Jul 10 01:01:32.161604 env[1248]: time="2025-07-10T01:01:32.144846039Z" level=info msg="RemoveContainer for \"a4124f167ef32428fc7c8ae89608ca57236eb60a85d3f8458f5afdb67df965ff\" returns successfully" Jul 10 01:01:32.599000 audit[6067]: AVC avc: denied { watch } for pid=6067 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:32.657819 kernel: kauditd_printk_skb: 124 callbacks suppressed Jul 10 01:01:32.665036 kernel: audit: type=1400 audit(1752109292.599:1677): avc: denied { watch } for pid=6067 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:32.667920 kernel: audit: type=1400 audit(1752109292.599:1678): avc: denied { watch } for pid=6067 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:32.668511 kernel: audit: type=1300 audit(1752109292.599:1677): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0009115e0 a2=fc6 a3=0 items=0 ppid=1781 pid=6067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:01:32.668551 kernel: audit: type=1327 audit(1752109292.599:1677): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:01:32.669592 kernel: audit: type=1300 audit(1752109292.599:1678): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000d140f0 a2=fc6 a3=0 items=0 ppid=1781 pid=6067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:01:32.669652 kernel: audit: type=1327 audit(1752109292.599:1678): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:01:32.599000 audit[6067]: AVC avc: denied { watch } for pid=6067 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:32.599000 audit[6067]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0009115e0 a2=fc6 a3=0 items=0 ppid=1781 pid=6067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:01:32.599000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:01:32.599000 audit[6067]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000d140f0 a2=fc6 a3=0 items=0 ppid=1781 pid=6067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:01:32.599000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:01:35.576260 kubelet[2097]: I0710 01:01:35.566966 2097 scope.go:117] "RemoveContainer" containerID="a4124f167ef32428fc7c8ae89608ca57236eb60a85d3f8458f5afdb67df965ff" Jul 10 01:01:35.944686 env[1248]: time="2025-07-10T01:01:35.944576125Z" level=error msg="ContainerStatus for \"a4124f167ef32428fc7c8ae89608ca57236eb60a85d3f8458f5afdb67df965ff\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"a4124f167ef32428fc7c8ae89608ca57236eb60a85d3f8458f5afdb67df965ff\": not found" Jul 10 01:01:35.989510 kubelet[2097]: E0710 01:01:35.986949 2097 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"a4124f167ef32428fc7c8ae89608ca57236eb60a85d3f8458f5afdb67df965ff\": not found" containerID="a4124f167ef32428fc7c8ae89608ca57236eb60a85d3f8458f5afdb67df965ff" Jul 10 01:01:36.101698 kubelet[2097]: I0710 01:01:36.101660 2097 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"a4124f167ef32428fc7c8ae89608ca57236eb60a85d3f8458f5afdb67df965ff"} err="failed to get container status \"a4124f167ef32428fc7c8ae89608ca57236eb60a85d3f8458f5afdb67df965ff\": rpc error: code = NotFound desc = an error occurred when try to find container \"a4124f167ef32428fc7c8ae89608ca57236eb60a85d3f8458f5afdb67df965ff\": not found" Jul 10 01:01:36.202650 kubelet[2097]: I0710 01:01:36.202576 2097 scope.go:117] "RemoveContainer" containerID="f979f954dc4b621d38be74a1ddaf7f8bbb36a54a0054a5d4872d99e28d86033b" Jul 10 01:01:36.238183 kubelet[2097]: E0710 01:01:36.238161 2097 kubelet.go:2573] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="5.794s" Jul 10 01:01:36.546525 env[1248]: time="2025-07-10T01:01:36.546447786Z" level=info msg="CreateContainer within sandbox \"c57946d9e85df0df95ae70266daa0a83f6340bbe97fe63716b98d7a4d0cfbe26\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Jul 10 01:01:36.641003 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount373601044.mount: Deactivated successfully. Jul 10 01:01:36.656228 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2999951488.mount: Deactivated successfully. Jul 10 01:01:36.672100 env[1248]: time="2025-07-10T01:01:36.666695562Z" level=info msg="CreateContainer within sandbox \"c57946d9e85df0df95ae70266daa0a83f6340bbe97fe63716b98d7a4d0cfbe26\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"420dbb7499a07220c88eae3f2b68fb6ebbd36cbe53c724f5d2138ad850e02f6b\"" Jul 10 01:01:36.783008 env[1248]: time="2025-07-10T01:01:36.782600654Z" level=info msg="StartContainer for \"420dbb7499a07220c88eae3f2b68fb6ebbd36cbe53c724f5d2138ad850e02f6b\"" Jul 10 01:01:36.914618 systemd[1]: Started cri-containerd-420dbb7499a07220c88eae3f2b68fb6ebbd36cbe53c724f5d2138ad850e02f6b.scope. Jul 10 01:01:36.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.968774 kernel: audit: type=1400 audit(1752109296.929:1679): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.996166 kernel: audit: type=1400 audit(1752109296.929:1680): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.996218 kernel: audit: type=1400 audit(1752109296.929:1681): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.996237 kernel: audit: type=1400 audit(1752109296.929:1682): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.930000 audit: BPF prog-id=255 op=LOAD Jul 10 01:01:36.932000 audit[6172]: AVC avc: denied { bpf } for pid=6172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.932000 audit[6172]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1842 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:36.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432306462623734393961303732323063383865616533663262363866 Jul 10 01:01:36.932000 audit[6172]: AVC avc: denied { perfmon } for pid=6172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.932000 audit[6172]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1842 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:36.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432306462623734393961303732323063383865616533663262363866 Jul 10 01:01:36.932000 audit[6172]: AVC avc: denied { bpf } for pid=6172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.932000 audit[6172]: AVC avc: denied { bpf } for pid=6172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.932000 audit[6172]: AVC avc: denied { bpf } for pid=6172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.932000 audit[6172]: AVC avc: denied { perfmon } for pid=6172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.932000 audit[6172]: AVC avc: denied { perfmon } for pid=6172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.932000 audit[6172]: AVC avc: denied { perfmon } for pid=6172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.932000 audit[6172]: AVC avc: denied { perfmon } for pid=6172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.932000 audit[6172]: AVC avc: denied { perfmon } for pid=6172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.932000 audit[6172]: AVC avc: denied { bpf } for pid=6172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.932000 audit[6172]: AVC avc: denied { bpf } for pid=6172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.932000 audit: BPF prog-id=256 op=LOAD Jul 10 01:01:36.932000 audit[6172]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000304b80 items=0 ppid=1842 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:36.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432306462623734393961303732323063383865616533663262363866 Jul 10 01:01:36.938000 audit[6172]: AVC avc: denied { bpf } for pid=6172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.938000 audit[6172]: AVC avc: denied { bpf } for pid=6172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.938000 audit[6172]: AVC avc: denied { perfmon } for pid=6172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.938000 audit[6172]: AVC avc: denied { perfmon } for pid=6172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.938000 audit[6172]: AVC avc: denied { perfmon } for pid=6172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.938000 audit[6172]: AVC avc: denied { perfmon } for pid=6172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.938000 audit[6172]: AVC avc: denied { perfmon } for pid=6172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.938000 audit[6172]: AVC avc: denied { bpf } for pid=6172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.938000 audit[6172]: AVC avc: denied { bpf } for pid=6172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.938000 audit: BPF prog-id=257 op=LOAD Jul 10 01:01:36.938000 audit[6172]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000304bc8 items=0 ppid=1842 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:36.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432306462623734393961303732323063383865616533663262363866 Jul 10 01:01:36.938000 audit: BPF prog-id=257 op=UNLOAD Jul 10 01:01:36.938000 audit: BPF prog-id=256 op=UNLOAD Jul 10 01:01:36.938000 audit[6172]: AVC avc: denied { bpf } for pid=6172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.938000 audit[6172]: AVC avc: denied { bpf } for pid=6172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.938000 audit[6172]: AVC avc: denied { bpf } for pid=6172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.938000 audit[6172]: AVC avc: denied { perfmon } for pid=6172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.938000 audit[6172]: AVC avc: denied { perfmon } for pid=6172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.938000 audit[6172]: AVC avc: denied { perfmon } for pid=6172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.938000 audit[6172]: AVC avc: denied { perfmon } for pid=6172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.938000 audit[6172]: AVC avc: denied { perfmon } for pid=6172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.938000 audit[6172]: AVC avc: denied { bpf } for pid=6172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.938000 audit[6172]: AVC avc: denied { bpf } for pid=6172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 01:01:36.938000 audit: BPF prog-id=258 op=LOAD Jul 10 01:01:36.938000 audit[6172]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000304fd8 items=0 ppid=1842 pid=6172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:36.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432306462623734393961303732323063383865616533663262363866 Jul 10 01:01:37.037369 env[1248]: time="2025-07-10T01:01:36.976057461Z" level=info msg="StartContainer for \"420dbb7499a07220c88eae3f2b68fb6ebbd36cbe53c724f5d2138ad850e02f6b\" returns successfully" Jul 10 01:01:38.737618 kubelet[2097]: E0710 01:01:38.735250 2097 kubelet.go:2573] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.568s" Jul 10 01:01:39.343921 kubelet[2097]: I0710 01:01:39.343883 2097 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="e40791bb-1dd3-4f13-a751-d75795ef4c90" path="/var/lib/kubelet/pods/e40791bb-1dd3-4f13-a751-d75795ef4c90/volumes" Jul 10 01:01:40.464887 update_engine[1241]: I0710 01:01:40.448024 1241 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 10 01:01:40.514550 update_engine[1241]: I0710 01:01:40.514520 1241 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 10 01:01:40.519197 update_engine[1241]: E0710 01:01:40.519172 1241 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 10 01:01:40.522855 update_engine[1241]: I0710 01:01:40.522831 1241 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Jul 10 01:01:42.330883 sshd[6013]: pam_unix(sshd:session): session closed for user core Jul 10 01:01:42.432443 kernel: kauditd_printk_skb: 53 callbacks suppressed Jul 10 01:01:42.448600 kernel: audit: type=1106 audit(1752109302.388:1697): pid=6013 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:42.451773 kernel: audit: type=1104 audit(1752109302.393:1698): pid=6013 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:42.451827 kernel: audit: type=1130 audit(1752109302.397:1699): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.109:22-139.178.68.195:37832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:42.388000 audit[6013]: USER_END pid=6013 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:42.476716 kernel: audit: type=1131 audit(1752109302.462:1700): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.109:22-139.178.68.195:59008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:42.393000 audit[6013]: CRED_DISP pid=6013 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:42.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.109:22-139.178.68.195:37832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:42.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.109:22-139.178.68.195:59008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:42.397637 systemd[1]: Started sshd@18-139.178.70.109:22-139.178.68.195:37832.service. Jul 10 01:01:42.458265 systemd[1]: sshd@17-139.178.70.109:22-139.178.68.195:59008.service: Deactivated successfully. Jul 10 01:01:42.463384 systemd[1]: session-16.scope: Deactivated successfully. Jul 10 01:01:42.463489 systemd[1]: session-16.scope: Consumed 1.918s CPU time. Jul 10 01:01:42.467588 systemd-logind[1239]: Session 16 logged out. Waiting for processes to exit. Jul 10 01:01:42.468314 systemd-logind[1239]: Removed session 16. Jul 10 01:01:42.556000 audit[6204]: USER_ACCT pid=6204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:42.564366 kernel: audit: type=1101 audit(1752109302.556:1701): pid=6204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:42.564432 kernel: audit: type=1103 audit(1752109302.563:1702): pid=6204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:42.563000 audit[6204]: CRED_ACQ pid=6204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:42.568360 sshd[6204]: Accepted publickey for core from 139.178.68.195 port 37832 ssh2: RSA SHA256:NVpdRDPpwzjVTzi6orhe1cA9BvcYymCSReGH8myOy/Q Jul 10 01:01:42.574621 kernel: audit: type=1006 audit(1752109302.563:1703): pid=6204 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Jul 10 01:01:42.574679 kernel: audit: type=1300 audit(1752109302.563:1703): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd21428300 a2=3 a3=0 items=0 ppid=1 pid=6204 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:42.574703 kernel: audit: type=1327 audit(1752109302.563:1703): proctitle=737368643A20636F7265205B707269765D Jul 10 01:01:42.563000 audit[6204]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd21428300 a2=3 a3=0 items=0 ppid=1 pid=6204 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:42.563000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 01:01:42.569554 sshd[6204]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 01:01:42.598808 systemd-logind[1239]: New session 17 of user core. Jul 10 01:01:42.599496 systemd[1]: Started session-17.scope. Jul 10 01:01:42.603000 audit[6204]: USER_START pid=6204 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:42.607000 audit[6207]: CRED_ACQ pid=6207 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:42.608365 kernel: audit: type=1105 audit(1752109302.603:1704): pid=6204 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:43.345109 sshd[6204]: pam_unix(sshd:session): session closed for user core Jul 10 01:01:43.345000 audit[6204]: USER_END pid=6204 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:43.345000 audit[6204]: CRED_DISP pid=6204 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:43.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.109:22-139.178.68.195:37832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:43.347110 systemd[1]: sshd@18-139.178.70.109:22-139.178.68.195:37832.service: Deactivated successfully. Jul 10 01:01:43.347653 systemd[1]: session-17.scope: Deactivated successfully. Jul 10 01:01:43.348086 systemd-logind[1239]: Session 17 logged out. Waiting for processes to exit. Jul 10 01:01:43.348683 systemd-logind[1239]: Removed session 17. Jul 10 01:01:48.361613 kernel: kauditd_printk_skb: 4 callbacks suppressed Jul 10 01:01:48.376973 kernel: audit: type=1130 audit(1752109308.359:1709): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.109:22-139.178.68.195:56092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:48.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.109:22-139.178.68.195:56092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:48.359701 systemd[1]: Started sshd@19-139.178.70.109:22-139.178.68.195:56092.service. Jul 10 01:01:48.834000 audit[6218]: USER_ACCT pid=6218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:48.842610 kernel: audit: type=1101 audit(1752109308.834:1710): pid=6218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:48.844498 kernel: audit: type=1103 audit(1752109308.839:1711): pid=6218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:48.844527 kernel: audit: type=1006 audit(1752109308.839:1712): pid=6218 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Jul 10 01:01:48.839000 audit[6218]: CRED_ACQ pid=6218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:48.847855 kernel: audit: type=1300 audit(1752109308.839:1712): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4eb3c280 a2=3 a3=0 items=0 ppid=1 pid=6218 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:48.839000 audit[6218]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4eb3c280 a2=3 a3=0 items=0 ppid=1 pid=6218 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:48.859011 kernel: audit: type=1327 audit(1752109308.839:1712): proctitle=737368643A20636F7265205B707269765D Jul 10 01:01:48.839000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 01:01:48.859094 sshd[6218]: Accepted publickey for core from 139.178.68.195 port 56092 ssh2: RSA SHA256:NVpdRDPpwzjVTzi6orhe1cA9BvcYymCSReGH8myOy/Q Jul 10 01:01:48.868512 kernel: audit: type=1105 audit(1752109308.859:1713): pid=6218 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:48.868546 kernel: audit: type=1103 audit(1752109308.860:1714): pid=6220 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:48.859000 audit[6218]: USER_START pid=6218 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:48.860000 audit[6220]: CRED_ACQ pid=6220 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:48.856242 systemd[1]: Started session-18.scope. Jul 10 01:01:48.849258 sshd[6218]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 01:01:48.857113 systemd-logind[1239]: New session 18 of user core. Jul 10 01:01:49.464000 audit[6067]: AVC avc: denied { watch } for pid=6067 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=7350 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 10 01:01:49.500217 kernel: audit: type=1400 audit(1752109309.464:1715): avc: denied { watch } for pid=6067 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=7350 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 10 01:01:49.502201 kernel: audit: type=1300 audit(1752109309.464:1715): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ad8400 a2=fc6 a3=0 items=0 ppid=1781 pid=6067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:01:49.464000 audit[6067]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ad8400 a2=fc6 a3=0 items=0 ppid=1781 pid=6067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:01:49.464000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:01:49.467000 audit[6067]: AVC avc: denied { watch } for pid=6067 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds" dev="sda9" ino=8261 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 10 01:01:49.467000 audit[6067]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c1f2c0 a2=fc6 a3=0 items=0 ppid=1781 pid=6067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:01:49.467000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:01:49.479000 audit[6231]: AVC avc: denied { execute } for pid=6231 comm="kube-controller" name="uds" dev="sda9" ino=8426 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:usr_t:s0 tclass=file permissive=0 Jul 10 01:01:49.479000 audit[6231]: SYSCALL arch=c000003e syscall=59 success=no exit=-13 a0=c000c1f720 a1=c000915020 a2=c000d82c00 a3=0 items=0 ppid=6067 pid=6231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:01:49.479000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:01:50.125249 sshd[6218]: pam_unix(sshd:session): session closed for user core Jul 10 01:01:50.170000 audit[6218]: USER_END pid=6218 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:50.173000 audit[6218]: CRED_DISP pid=6218 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:50.188323 systemd[1]: sshd@19-139.178.70.109:22-139.178.68.195:56092.service: Deactivated successfully. Jul 10 01:01:50.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.109:22-139.178.68.195:56092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:50.196815 systemd[1]: session-18.scope: Deactivated successfully. Jul 10 01:01:50.201740 systemd-logind[1239]: Session 18 logged out. Waiting for processes to exit. Jul 10 01:01:50.256820 systemd-logind[1239]: Removed session 18. Jul 10 01:01:50.359000 audit[6067]: AVC avc: denied { watch } for pid=6067 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:50.359000 audit[6067]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0017f5260 a2=fc6 a3=0 items=0 ppid=1781 pid=6067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:01:50.359000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:01:50.361000 audit[6067]: AVC avc: denied { watch } for pid=6067 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:50.361000 audit[6067]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0017f5420 a2=fc6 a3=0 items=0 ppid=1781 pid=6067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:01:50.361000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:01:50.361000 audit[6067]: AVC avc: denied { watch } for pid=6067 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:50.361000 audit[6067]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0017f5460 a2=fc6 a3=0 items=0 ppid=1781 pid=6067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:01:50.361000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:01:50.361000 audit[6067]: AVC avc: denied { watch } for pid=6067 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:01:50.361000 audit[6067]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0017f57a0 a2=fc6 a3=0 items=0 ppid=1781 pid=6067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:01:50.361000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:01:50.418021 update_engine[1241]: I0710 01:01:50.415402 1241 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 10 01:01:50.437017 update_engine[1241]: I0710 01:01:50.436913 1241 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 10 01:01:50.437318 update_engine[1241]: E0710 01:01:50.437206 1241 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 10 01:01:50.437318 update_engine[1241]: I0710 01:01:50.437266 1241 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Jul 10 01:01:50.437318 update_engine[1241]: I0710 01:01:50.437274 1241 omaha_request_action.cc:621] Omaha request response: Jul 10 01:01:50.437742 update_engine[1241]: E0710 01:01:50.437667 1241 omaha_request_action.cc:640] Omaha request network transfer failed. Jul 10 01:01:50.437742 update_engine[1241]: I0710 01:01:50.437714 1241 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Jul 10 01:01:50.437742 update_engine[1241]: I0710 01:01:50.437718 1241 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jul 10 01:01:50.437742 update_engine[1241]: I0710 01:01:50.437721 1241 update_attempter.cc:306] Processing Done. Jul 10 01:01:50.439248 update_engine[1241]: E0710 01:01:50.439169 1241 update_attempter.cc:619] Update failed. Jul 10 01:01:50.439248 update_engine[1241]: I0710 01:01:50.439180 1241 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Jul 10 01:01:50.439248 update_engine[1241]: I0710 01:01:50.439183 1241 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Jul 10 01:01:50.439248 update_engine[1241]: I0710 01:01:50.439186 1241 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Jul 10 01:01:50.448106 update_engine[1241]: I0710 01:01:50.447965 1241 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Jul 10 01:01:50.450402 update_engine[1241]: I0710 01:01:50.450086 1241 omaha_request_action.cc:270] Posting an Omaha request to disabled Jul 10 01:01:50.450402 update_engine[1241]: I0710 01:01:50.450103 1241 omaha_request_action.cc:271] Request: Jul 10 01:01:50.450402 update_engine[1241]: Jul 10 01:01:50.450402 update_engine[1241]: Jul 10 01:01:50.450402 update_engine[1241]: Jul 10 01:01:50.450402 update_engine[1241]: Jul 10 01:01:50.450402 update_engine[1241]: Jul 10 01:01:50.450402 update_engine[1241]: Jul 10 01:01:50.450402 update_engine[1241]: I0710 01:01:50.450111 1241 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 10 01:01:50.450402 update_engine[1241]: I0710 01:01:50.450235 1241 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 10 01:01:50.450402 update_engine[1241]: E0710 01:01:50.450287 1241 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 10 01:01:50.450402 update_engine[1241]: I0710 01:01:50.450348 1241 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Jul 10 01:01:50.450402 update_engine[1241]: I0710 01:01:50.450352 1241 omaha_request_action.cc:621] Omaha request response: Jul 10 01:01:50.450402 update_engine[1241]: I0710 01:01:50.450356 1241 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jul 10 01:01:50.450402 update_engine[1241]: I0710 01:01:50.450358 1241 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jul 10 01:01:50.450402 update_engine[1241]: I0710 01:01:50.450359 1241 update_attempter.cc:306] Processing Done. Jul 10 01:01:50.450402 update_engine[1241]: I0710 01:01:50.450361 1241 update_attempter.cc:310] Error event sent. Jul 10 01:01:50.452433 update_engine[1241]: I0710 01:01:50.452284 1241 update_check_scheduler.cc:74] Next update check in 43m27s Jul 10 01:01:50.496773 locksmithd[1293]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Jul 10 01:01:50.496773 locksmithd[1293]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Jul 10 01:01:51.146000 audit[6236]: NETFILTER_CFG table=filter:141 family=2 entries=33 op=nft_register_rule pid=6236 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:01:51.146000 audit[6236]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc9b567d20 a2=0 a3=7ffc9b567d0c items=0 ppid=2201 pid=6236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:51.146000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:01:51.150000 audit[6236]: NETFILTER_CFG table=nat:142 family=2 entries=47 op=nft_register_chain pid=6236 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:01:51.150000 audit[6236]: SYSCALL arch=c000003e syscall=46 success=yes exit=17468 a0=3 a1=7ffc9b567d20 a2=0 a3=7ffc9b567d0c items=0 ppid=2201 pid=6236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:51.150000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:01:51.165000 audit[6238]: NETFILTER_CFG table=filter:143 family=2 entries=32 op=nft_register_rule pid=6238 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:01:51.165000 audit[6238]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc2a2f5aa0 a2=0 a3=7ffc2a2f5a8c items=0 ppid=2201 pid=6238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:51.165000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:01:51.171000 audit[6238]: NETFILTER_CFG table=nat:144 family=2 entries=26 op=nft_register_rule pid=6238 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:01:51.171000 audit[6238]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffc2a2f5aa0 a2=0 a3=0 items=0 ppid=2201 pid=6238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:51.171000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:01:52.277000 audit[6260]: NETFILTER_CFG table=filter:145 family=2 entries=32 op=nft_register_rule pid=6260 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:01:52.277000 audit[6260]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc048ae260 a2=0 a3=7ffc048ae24c items=0 ppid=2201 pid=6260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:52.277000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:01:52.285000 audit[6260]: NETFILTER_CFG table=nat:146 family=2 entries=44 op=nft_unregister_chain pid=6260 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:01:52.285000 audit[6260]: SYSCALL arch=c000003e syscall=46 success=yes exit=12900 a0=3 a1=7ffc048ae260 a2=0 a3=7ffc048ae24c items=0 ppid=2201 pid=6260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:52.285000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:01:52.352000 audit: BPF prog-id=224 op=UNLOAD Jul 10 01:01:52.357000 audit: BPF prog-id=227 op=UNLOAD Jul 10 01:01:52.394633 env[1248]: time="2025-07-10T01:01:52.293255667Z" level=info msg="StopContainer for \"3ca7b7f9a933d209cc0f114a7f26886bafcbfc6e7ed6234152fd189069c6f46a\" with timeout 30 (s)" Jul 10 01:01:52.394633 env[1248]: time="2025-07-10T01:01:52.331129515Z" level=info msg="Stop container \"3ca7b7f9a933d209cc0f114a7f26886bafcbfc6e7ed6234152fd189069c6f46a\" with signal terminated" Jul 10 01:01:52.394633 env[1248]: time="2025-07-10T01:01:52.377285267Z" level=info msg="shim disconnected" id=3ca7b7f9a933d209cc0f114a7f26886bafcbfc6e7ed6234152fd189069c6f46a Jul 10 01:01:52.394633 env[1248]: time="2025-07-10T01:01:52.377569703Z" level=warning msg="cleaning up after shim disconnected" id=3ca7b7f9a933d209cc0f114a7f26886bafcbfc6e7ed6234152fd189069c6f46a namespace=k8s.io Jul 10 01:01:52.394633 env[1248]: time="2025-07-10T01:01:52.377576367Z" level=info msg="cleaning up dead shim" Jul 10 01:01:52.394633 env[1248]: time="2025-07-10T01:01:52.386679621Z" level=warning msg="cleanup warnings time=\"2025-07-10T01:01:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6280 runtime=io.containerd.runc.v2\n" Jul 10 01:01:52.394633 env[1248]: time="2025-07-10T01:01:52.394784037Z" level=info msg="StopContainer for \"3ca7b7f9a933d209cc0f114a7f26886bafcbfc6e7ed6234152fd189069c6f46a\" returns successfully" Jul 10 01:01:52.352514 systemd[1]: cri-containerd-3ca7b7f9a933d209cc0f114a7f26886bafcbfc6e7ed6234152fd189069c6f46a.scope: Deactivated successfully. Jul 10 01:01:52.374273 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3ca7b7f9a933d209cc0f114a7f26886bafcbfc6e7ed6234152fd189069c6f46a-rootfs.mount: Deactivated successfully. Jul 10 01:01:52.456352 env[1248]: time="2025-07-10T01:01:52.452946058Z" level=info msg="StopPodSandbox for \"4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd\"" Jul 10 01:01:52.456352 env[1248]: time="2025-07-10T01:01:52.452995914Z" level=info msg="Container to stop \"3ca7b7f9a933d209cc0f114a7f26886bafcbfc6e7ed6234152fd189069c6f46a\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Jul 10 01:01:52.455010 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd-shm.mount: Deactivated successfully. Jul 10 01:01:52.465712 systemd[1]: cri-containerd-4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd.scope: Deactivated successfully. Jul 10 01:01:52.465000 audit: BPF prog-id=189 op=UNLOAD Jul 10 01:01:52.472000 audit: BPF prog-id=192 op=UNLOAD Jul 10 01:01:52.479548 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd-rootfs.mount: Deactivated successfully. Jul 10 01:01:52.480749 env[1248]: time="2025-07-10T01:01:52.480718135Z" level=info msg="shim disconnected" id=4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd Jul 10 01:01:52.481030 env[1248]: time="2025-07-10T01:01:52.481018781Z" level=warning msg="cleaning up after shim disconnected" id=4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd namespace=k8s.io Jul 10 01:01:52.481268 env[1248]: time="2025-07-10T01:01:52.481259589Z" level=info msg="cleaning up dead shim" Jul 10 01:01:52.486944 env[1248]: time="2025-07-10T01:01:52.486920172Z" level=warning msg="cleanup warnings time=\"2025-07-10T01:01:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6310 runtime=io.containerd.runc.v2\n" Jul 10 01:01:53.167097 systemd-networkd[1059]: cali9791e28cf41: Link DOWN Jul 10 01:01:53.167108 systemd-networkd[1059]: cali9791e28cf41: Lost carrier Jul 10 01:01:53.570000 audit[6350]: NETFILTER_CFG table=filter:147 family=2 entries=63 op=nft_register_rule pid=6350 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 01:01:53.615308 kernel: kauditd_printk_skb: 44 callbacks suppressed Jul 10 01:01:53.621625 kernel: audit: type=1325 audit(1752109313.570:1735): table=filter:147 family=2 entries=63 op=nft_register_rule pid=6350 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 01:01:53.622666 kernel: audit: type=1300 audit(1752109313.570:1735): arch=c000003e syscall=46 success=yes exit=10252 a0=3 a1=7ffcdc09db40 a2=0 a3=7ffcdc09db2c items=0 ppid=3380 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:53.622690 kernel: audit: type=1327 audit(1752109313.570:1735): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 01:01:53.622754 kernel: audit: type=1325 audit(1752109313.570:1736): table=filter:148 family=2 entries=4 op=nft_unregister_chain pid=6350 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 01:01:53.622784 kernel: audit: type=1300 audit(1752109313.570:1736): arch=c000003e syscall=46 success=yes exit=560 a0=3 a1=7ffcdc09db40 a2=0 a3=5616be6c1000 items=0 ppid=3380 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:53.622807 kernel: audit: type=1327 audit(1752109313.570:1736): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 01:01:53.570000 audit[6350]: SYSCALL arch=c000003e syscall=46 success=yes exit=10252 a0=3 a1=7ffcdc09db40 a2=0 a3=7ffcdc09db2c items=0 ppid=3380 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:53.570000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 01:01:53.570000 audit[6350]: NETFILTER_CFG table=filter:148 family=2 entries=4 op=nft_unregister_chain pid=6350 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 01:01:53.570000 audit[6350]: SYSCALL arch=c000003e syscall=46 success=yes exit=560 a0=3 a1=7ffcdc09db40 a2=0 a3=5616be6c1000 items=0 ppid=3380 pid=6350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:53.570000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 01:01:54.008660 env[1248]: 2025-07-10 01:01:53.079 [INFO][6332] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" Jul 10 01:01:54.008660 env[1248]: 2025-07-10 01:01:53.093 [INFO][6332] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" iface="eth0" netns="/var/run/netns/cni-39627629-9cc9-09f2-6492-fdb8902298e5" Jul 10 01:01:54.008660 env[1248]: 2025-07-10 01:01:53.094 [INFO][6332] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" iface="eth0" netns="/var/run/netns/cni-39627629-9cc9-09f2-6492-fdb8902298e5" Jul 10 01:01:54.008660 env[1248]: 2025-07-10 01:01:53.108 [INFO][6332] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" after=14.692542ms iface="eth0" netns="/var/run/netns/cni-39627629-9cc9-09f2-6492-fdb8902298e5" Jul 10 01:01:54.008660 env[1248]: 2025-07-10 01:01:53.108 [INFO][6332] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" Jul 10 01:01:54.008660 env[1248]: 2025-07-10 01:01:53.108 [INFO][6332] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" Jul 10 01:01:54.008660 env[1248]: 2025-07-10 01:01:53.729 [INFO][6339] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" HandleID="k8s-pod-network.4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0" Jul 10 01:01:54.008660 env[1248]: 2025-07-10 01:01:53.736 [INFO][6339] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 01:01:54.008660 env[1248]: 2025-07-10 01:01:53.736 [INFO][6339] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 01:01:54.008660 env[1248]: 2025-07-10 01:01:53.924 [INFO][6339] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" HandleID="k8s-pod-network.4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0" Jul 10 01:01:54.008660 env[1248]: 2025-07-10 01:01:53.925 [INFO][6339] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" HandleID="k8s-pod-network.4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" Workload="localhost-k8s-calico--apiserver--6765fdc8c8--5kgrr-eth0" Jul 10 01:01:54.008660 env[1248]: 2025-07-10 01:01:53.927 [INFO][6339] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 01:01:54.008660 env[1248]: 2025-07-10 01:01:53.949 [INFO][6332] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd" Jul 10 01:01:54.044597 env[1248]: time="2025-07-10T01:01:54.009039564Z" level=info msg="TearDown network for sandbox \"4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd\" successfully" Jul 10 01:01:54.044597 env[1248]: time="2025-07-10T01:01:54.009076071Z" level=info msg="StopPodSandbox for \"4dd53c61aafe848a5a663b9d5971e1f76baacc9cb8677dc18a8f486abee06bdd\" returns successfully" Jul 10 01:01:54.044415 systemd[1]: run-netns-cni\x2d39627629\x2d9cc9\x2d09f2\x2d6492\x2dfdb8902298e5.mount: Deactivated successfully. Jul 10 01:01:54.743293 systemd[1]: run-containerd-runc-k8s.io-43baae38fde8959029f4a4ed2b5e8e9d1db5126c498892382179bddb7a08b550-runc.FmKT4t.mount: Deactivated successfully. Jul 10 01:01:55.251375 systemd[1]: Started sshd@20-139.178.70.109:22-139.178.68.195:56106.service. Jul 10 01:01:55.375807 kernel: audit: type=1130 audit(1752109315.278:1737): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.109:22-139.178.68.195:56106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:55.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.109:22-139.178.68.195:56106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:01:55.839000 audit[6372]: USER_ACCT pid=6372 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:55.909150 kernel: audit: type=1101 audit(1752109315.839:1738): pid=6372 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:55.914558 kernel: audit: type=1103 audit(1752109315.844:1739): pid=6372 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:55.917155 kernel: audit: type=1006 audit(1752109315.844:1740): pid=6372 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Jul 10 01:01:55.844000 audit[6372]: CRED_ACQ pid=6372 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:55.844000 audit[6372]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd06185370 a2=3 a3=0 items=0 ppid=1 pid=6372 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:01:55.844000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 01:01:55.969287 sshd[6372]: Accepted publickey for core from 139.178.68.195 port 56106 ssh2: RSA SHA256:NVpdRDPpwzjVTzi6orhe1cA9BvcYymCSReGH8myOy/Q Jul 10 01:01:55.852445 sshd[6372]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 01:01:55.989000 audit[6372]: USER_START pid=6372 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:55.990000 audit[6374]: CRED_ACQ pid=6374 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:01:55.978727 systemd-logind[1239]: New session 19 of user core. Jul 10 01:01:55.982819 systemd[1]: Started session-19.scope. Jul 10 01:02:01.493861 kernel: kauditd_printk_skb: 4 callbacks suppressed Jul 10 01:02:01.596878 kernel: audit: type=1325 audit(1752109321.485:1743): table=filter:149 family=2 entries=20 op=nft_register_rule pid=6405 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:02:01.603380 kernel: audit: type=1300 audit(1752109321.485:1743): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc88fefed0 a2=0 a3=7ffc88fefebc items=0 ppid=2201 pid=6405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:01.605061 kernel: audit: type=1327 audit(1752109321.485:1743): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:02:01.605880 kernel: audit: type=1325 audit(1752109321.500:1744): table=nat:150 family=2 entries=110 op=nft_register_chain pid=6405 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:02:01.607757 kernel: audit: type=1300 audit(1752109321.500:1744): arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7ffc88fefed0 a2=0 a3=7ffc88fefebc items=0 ppid=2201 pid=6405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:01.607789 kernel: audit: type=1327 audit(1752109321.500:1744): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:02:01.485000 audit[6405]: NETFILTER_CFG table=filter:149 family=2 entries=20 op=nft_register_rule pid=6405 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:02:01.485000 audit[6405]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc88fefed0 a2=0 a3=7ffc88fefebc items=0 ppid=2201 pid=6405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:01.485000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:02:01.500000 audit[6405]: NETFILTER_CFG table=nat:150 family=2 entries=110 op=nft_register_chain pid=6405 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 01:02:01.500000 audit[6405]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7ffc88fefed0 a2=0 a3=7ffc88fefebc items=0 ppid=2201 pid=6405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 01:02:01.500000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 01:02:09.641000 audit[4645]: AVC avc: denied { watch } for pid=4645 comm="apiserver" path="/calico-apiserver-certs/..2025_07_10_00_58_42.1989100588/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c888 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c888 tclass=file permissive=0 Jul 10 01:02:09.814788 kernel: audit: type=1400 audit(1752109329.641:1745): avc: denied { watch } for pid=4645 comm="apiserver" path="/calico-apiserver-certs/..2025_07_10_00_58_42.1989100588/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c888 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c888 tclass=file permissive=0 Jul 10 01:02:09.837800 kernel: audit: type=1300 audit(1752109329.641:1745): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0010ed580 a2=fc6 a3=0 items=0 ppid=4006 pid=4645 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c888 key=(null) Jul 10 01:02:09.837871 kernel: audit: type=1327 audit(1752109329.641:1745): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 10 01:02:09.641000 audit[4645]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0010ed580 a2=fc6 a3=0 items=0 ppid=4006 pid=4645 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c888 key=(null) Jul 10 01:02:09.641000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 10 01:02:10.904000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7325 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:02:11.104679 kernel: audit: type=1400 audit(1752109330.904:1746): avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7325 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:02:11.116121 kernel: audit: type=1300 audit(1752109330.904:1746): arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c010341860 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 01:02:11.117937 kernel: audit: type=1327 audit(1752109330.904:1746): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 01:02:11.119426 kernel: audit: type=1400 audit(1752109330.970:1747): avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7319 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:02:11.119466 kernel: audit: type=1300 audit(1752109330.970:1747): arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c004f77f50 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 01:02:11.119498 kernel: audit: type=1327 audit(1752109330.970:1747): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 01:02:11.119547 kernel: audit: type=1400 audit(1752109330.993:1748): avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:02:10.904000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c010341860 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 01:02:10.904000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 01:02:10.970000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7319 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:02:10.970000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c004f77f50 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 01:02:10.970000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 01:02:10.993000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:02:10.993000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c007ff3200 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 01:02:10.993000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 01:02:11.004000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:02:11.004000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c007ff3240 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 01:02:11.004000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 01:02:11.125000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:02:11.125000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c005f6eae0 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 01:02:11.125000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 01:02:11.217000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:02:11.217000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00623c780 a2=fc6 a3=0 items=0 ppid=1789 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c466 key=(null) Jul 10 01:02:11.217000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Jul 10 01:02:28.582000 audit[5963]: AVC avc: denied { watch } for pid=5963 comm="apiserver" path="/calico-apiserver-certs/..2025_07_10_01_00_17.2138663860/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c763,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c763,c995 tclass=file permissive=0 Jul 10 01:02:28.747931 kernel: kauditd_printk_skb: 11 callbacks suppressed Jul 10 01:02:28.759520 kernel: audit: type=1400 audit(1752109348.582:1752): avc: denied { watch } for pid=5963 comm="apiserver" path="/calico-apiserver-certs/..2025_07_10_01_00_17.2138663860/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c763,c995 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c763,c995 tclass=file permissive=0 Jul 10 01:02:28.764384 kernel: audit: type=1300 audit(1752109348.582:1752): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002975260 a2=fc6 a3=0 items=0 ppid=5487 pid=5963 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c763,c995 key=(null) Jul 10 01:02:28.767618 kernel: audit: type=1327 audit(1752109348.582:1752): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 10 01:02:28.582000 audit[5963]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002975260 a2=fc6 a3=0 items=0 ppid=5487 pid=5963 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c763,c995 key=(null) Jul 10 01:02:28.582000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 10 01:02:30.554890 kubelet[2097]: E0710 01:02:19.920202 2097 kubelet.go:2573] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="23.699s" Jul 10 01:02:32.017641 sshd[6372]: pam_unix(sshd:session): session closed for user core Jul 10 01:02:32.105143 kernel: audit: type=1106 audit(1752109352.066:1753): pid=6372 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:02:32.108736 kernel: audit: type=1104 audit(1752109352.071:1754): pid=6372 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:02:32.108780 kernel: audit: type=1131 audit(1752109352.089:1755): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.109:22-139.178.68.195:56106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:02:32.066000 audit[6372]: USER_END pid=6372 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:02:32.071000 audit[6372]: CRED_DISP pid=6372 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 10 01:02:32.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.109:22-139.178.68.195:56106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 01:02:32.083056 systemd[1]: sshd@20-139.178.70.109:22-139.178.68.195:56106.service: Deactivated successfully. Jul 10 01:02:32.090730 systemd[1]: session-19.scope: Deactivated successfully. Jul 10 01:02:32.090816 systemd[1]: session-19.scope: Consumed 4.406s CPU time. Jul 10 01:02:32.094877 systemd-logind[1239]: Session 19 logged out. Waiting for processes to exit. Jul 10 01:02:32.107909 systemd-logind[1239]: Removed session 19. Jul 10 01:02:32.328062 kubelet[2097]: E0710 01:02:32.327976 2097 kubelet.go:2406] "Skipping pod synchronization" err="container runtime is down" Jul 10 01:02:32.566103 kubelet[2097]: E0710 01:02:32.566066 2097 kubelet.go:2406] "Skipping pod synchronization" err="container runtime is down" Jul 10 01:02:32.642000 audit[6067]: AVC avc: denied { watch } for pid=6067 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:02:32.679485 kernel: audit: type=1400 audit(1752109352.642:1756): avc: denied { watch } for pid=6067 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:02:32.683793 kernel: audit: type=1300 audit(1752109352.642:1756): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0015f23c0 a2=fc6 a3=0 items=0 ppid=1781 pid=6067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:02:32.683848 kernel: audit: type=1327 audit(1752109352.642:1756): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:02:32.688965 kernel: audit: type=1400 audit(1752109352.680:1757): avc: denied { watch } for pid=6067 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:02:32.642000 audit[6067]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0015f23c0 a2=fc6 a3=0 items=0 ppid=1781 pid=6067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:02:32.642000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:02:32.680000 audit[6067]: AVC avc: denied { watch } for pid=6067 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 10 01:02:32.680000 audit[6067]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00130fef0 a2=fc6 a3=0 items=0 ppid=1781 pid=6067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c887 key=(null) Jul 10 01:02:32.680000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 10 01:02:32.886456 systemd[1]: run-containerd-runc-k8s.io-43baae38fde8959029f4a4ed2b5e8e9d1db5126c498892382179bddb7a08b550-runc.16VLUt.mount: Deactivated successfully.